Iso TR 31700 2 2023
Iso TR 31700 2 2023
REPORT 31700-2
First edition
2023-01
Reference number
ISO/TR 31700-2:2023(E)
Contents Page
Foreword......................................................................................................................................................................................................................................... iv
Introduction..................................................................................................................................................................................................................................v
1 Scope.................................................................................................................................................................................................................................. 1
2 Normative references...................................................................................................................................................................................... 1
3 Terms and definitions..................................................................................................................................................................................... 1
4 Abbreviated terms.............................................................................................................................................................................................. 2
5 Overview of ISO 31700-1 requirements and related concepts............................................................................ 2
5.1 ISO 31700-1 Requirements........................................................................................................................................................... 2
5.2 Related concepts.................................................................................................................................................................................... 3
5.3 Viewpoints in the use cases......................................................................................................................................................... 6
5.3.1 General......................................................................................................................................................................................... 6
5.3.2 Consumer product viewpoint.................................................................................................................................. 6
5.3.3 Engineering framework viewpoint.................................................................................................................... 7
5.3.4 Ecosystem viewpoint...................................................................................................................................................... 7
6 Use case analysis................................................................................................................................................................................................... 7
6.1 General............................................................................................................................................................................................................ 7
6.2 Use case template.................................................................................................................................................................................. 7
7 Use cases........................................................................................................................................................................................................................ 8
7.1 General............................................................................................................................................................................................................ 8
7.2 On-line retailing..................................................................................................................................................................................... 9
7.2.1 On-line retailing use case main description............................................................................................... 9
7.2.2 On-line retailing consumer communication............................................................................................ 11
7.2.3 On-line retailing summary...................................................................................................................................... 12
7.2.4 On-line retailing general requirements....................................................................................................... 13
7.2.5 On-line retailing risk management.................................................................................................................. 14
7.2.6 On-line retailing development, deployment and operation....................................................... 15
7.2.7 On-line retailing end of PII lifecycle................................................................................................................ 16
7.3 Fitness company.................................................................................................................................................................................. 17
7.3.1 Fitness company use case main description........................................................................................... 17
7.3.2 Fitness company risk management of health application........................................................... 19
7.3.3 Fitness company consumer communication........................................................................................... 20
7.4 Smart locks for homes front doors..................................................................................................................................... 21
7.4.1 Smart locks product line main description.............................................................................................. 21
7.4.2 Smart locks basic configuration......................................................................................................................... 24
7.4.3 Smart locks colocation configuration............................................................................................................ 25
7.4.4 Smart locks family configuration...................................................................................................................... 26
7.4.5 Smart locks risk management.............................................................................................................................. 27
7.4.6 Smart locks consumer communication........................................................................................................ 28
7.4.7 Smart locks development, deployment and operation................................................................... 29
Bibliography.............................................................................................................................................................................................................................. 31
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury iii
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see
www.iso.org/iso/foreword.html.
This document was prepared by Project Committee ISO/PC 317, Consumer Protection – privacy by design
for consumer goods and services.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.
Introduction
ISO 31700-1[1] provides high-level requirements and recommendations for organizations using privacy
by design in the development, maintenance and operation of consumer goods and services. These are
grounded in a consumer-focused approach, in which consumer privacy rights and preferences are
placed at the heart of product development and operation.
Use case help to identify, clarify and organize system requirements related to a set of goals, by
illustrating a series of possible sequences of interactions between stakeholder(s) and system(s) in a
particular ecosystem.
The use cases in this document use a template that is based on IEC 62559-2 [2] while enabling a focus on
privacy by design challenges and on the ISO 31700-1 requirements.
Although there are a wide range of use cases, this document provides three sample use cases to help
further understand the implementation of ISO 31700-1: on-line retailing, a fitness company and smart
locks.
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury v
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
Single user license for: Sammy Chowdhury
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
TECHNICAL REPORT ISO/TR 31700-2:2023(E)
1 Scope
This document provides illustrative use cases, with associated analysis, chosen to assist in
understanding the requirements of 31700-1.
The intended audience includes engineers and practitioners who are involved in the development,
implementation or operation of digitally enabled consumer goods and services.
2 Normative references
There are no normative references in this document.
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 1
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
4 Abbreviated terms
Table 1 (continued)
Category ISO 31700-1 section number and requirement
7.2 Integrate the design and operation of privacy controls into the products develop-
ment and management lifecycles
7.3 Design privacy controls
7.4 Implement privacy controls
Develop, deploy and 7.5 Design privacy control testing
operate designed privacy
controls 7.6 Manage the transition of privacy controls
7.7 Manage the operation of privacy controls
7.8 Prepare breach management
7.9 Operate privacy controls for the processes and products that the product in
scope depends upon through the PII lifecycle
End of PII lifecycle re-
8.2 Design privacy controls for retirement and end of use
quirements
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 3
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Table 4 (continued)
Develop and implement the organizational governance structure to enable an ongoing
Govern-P understanding of the organization’s risk management priorities that are informed by
privacy risk
Develop and implement appropriate activities to enable organizations or individuals
Control-P to manage data with sufficient granularity to manage privacy risks
Table 6 (continued)
Privacy protec- NIST Privacy NIST privacy
Category of ISO 31700-1 Re- Lifecycle pro-
tion goals Framework engineering
requirement quirement cesses
functions objectives
5.2 Provision of pri- Organisation
Transparency Communicate-P Predictability
vacy information policies
5.3 Accountability
of responsible per- Organisation Govern-P Com- Predictability
Transparency
sons to providing policies municate-P Manageability
privacy information
Consumer 5.4 Responding to Predictability
communication consumer inquiries Product use Transparency Communicate-P
requirements and complaints Manageability
5.5 Communicating
to diverse consumer Product use Transparency Communicate-P Predictability
population
5.6 Prepare data
breach communica- Product use Transparency Communicate-P Predictability
tions
Product design Predictability
6.2 Conduct a priva- and development
Unlinkability Identify-P Manageability
cy risk assessment
Disassociability
Product design Predictability
6.3 Assess privacy
and development Identify-P, Pro-
capabilities of third Unlinkability Manageability
tect-P
parties
Disassociability
6.4 Establish and Product design Unlinkability Predictability
Risk manage- Identify-P, Con-
document require- and development
ment require- Intervenability trol-P, Communi- Manageability
ments for privacy
ments cate-P
controls Transparency Disassociability
Product design Predictability
6.5 Monitor and Identify-P,
and development
update risk assess- Unlinkability Manageability
ment Govern-P
Disassociability
6.6 Include privacy
risks in cyberse- Organisation Identify-P, Pro-
Unlinkability -
curity resilience policies tect-P
design
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 5
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Table 6 (continued)
Privacy protec- NIST Privacy NIST privacy
Category of ISO 31700-1 Re- Lifecycle pro-
tion goals Framework engineering
requirement quirement cesses
functions objectives
7.2 Integrate the de-
sign and operation
Unlinkability Predictability
of privacy controls
Organisation
into the products Intervenability Protect-P Manageability
policies
development and
Transparency Disassociability
management life-
cycles
Product design Unlinkability Predictability
7.3 Design privacy and development
Intervenability Protect-P Manageability
controls
Transparency Disassociability
Product design Unlinkability Predictability
7.4 Implement pri- and development
Intervenability Protect-P Manageability
vacy controls
Transparency Disassociability
Product design Unlinkability Predictability
Develop, deploy 7.5 Design privacy and development
Intervenability Protect-P Manageability
and operate control testing
designed privacy Transparency Disassociability
controls Predictability
7.6 Manage the Intervenability
Organisation Control-P, Com-
transition of priva- Manageability
policies Transparency municate-P
cy controls
Disassociability
Predictability
7.7 Manage the Intervenability
Organisation Control-P, Com-
operation of privacy Manageability
policies Transparency municate-P
controls
Disassociability
7.8 Prepare breach Organisation - Protect-P, Con-
-
management policies trol-P
7.9 Operate privacy
controls for the pro-
cesses and products
Control-P, Com-
that the product in Product use - -
municate-P
scope depends upon
through the PII
lifecycle
Predictability
8.2 Design privacy
End of PII lifecy- Product design Control-P, Com-
controls for retire- - Manageability
cle requirements and development municate-P
ment and end of use
Disassociability
5.3.1 General
The viewpoints presented here are shown in the sequence diagrams of the use cases in Clause 7.
Consumer products and associated organisational practices protect consumers’ privacy when the
product is in use and throughout the PII lifecycle while the PII is under the organisation’s purview.
Considering how a product is likely to be used in practice, during product development, can require a
number of different contexts and situations to be evaluated. Different users with different capabilities
are catered for. This applies as the product, once in the possession of a consumer user, is operated in
unconstrained circumstances where the consumer’s understanding and abilities can, and often do, vary
considerably.
For each type of use the precise definition of use is coupled with an accurate description of how the
product and any associated organisational processes would operate so as to protect privacy.
Finally, consumer use can change over time and vary between cultures or demographic groups.
The development and management of privacy controls is an essential part of the engineering of
consumers products. The resulting engineering framework combines:
— processes based on standards such as ISO/IEC/IEEE 15288[3];
— extensions of such processes that integrate privacy engineering. These extensions can be based on
ISO/IEC TR 27550,[5] with the support of frameworks such as the NIST Privacy Framework,[7] the
use of OASIS PMRM[6] to operationalize privacy principles;
— the integration of the consumer product viewpoint, which is supported by ISO 31700-1[1].
NOTE An additional reference to OASIS PMRM is under development: ISO/IEC 27561, Information technology
— Privacy operationalisation model and method for engineers — POMME
6.1 General
A use case template was developed to help illustrate, in a consistent manner, the use case examples. The
template is structured to provide the information that illustrates the use of ISO 31700-1.
— The entries for the main narrative are general. They include ID: use case name; description of
product, service or process; privacy protection goal; ecosystem and systems of interest; users,
stakeholders; PII; purpose; and use case narrative.
— The entries for the extended narratives follow the requirements of ISO 31700-1: general requirements;
consumer communication requirements; risk management requirements; development, deployment
and operations of designed privacy controls; and end of PII lifecycle requirements.
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 7
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Table 7 (continued)
Entry Entry description
Use case name Meaningful name
Description of product, ser- Short description of product
vice or process
Privacy protection goal Short description of privacy protection goals
Ecosystem and systems of Describe systems of interest
interest
Users Describe users
Stakeholders Describe stakeholders
PII Describe PII collected
Purpose Describe purpose of PII collection
Main narrative Short narrative on consumer goods and services (possibly with a sequence
diagram)
Table 9 lists proposed categories of extended narratives. They match categories of ISO 31700-1
requirements.
7 Use cases
7.1 General
Three use cases are described: on-line retailing, a fitness company and smart locks. These use cases
cover ISO 31700-1 requirements as shown in Table 10.
NOTE A sequence diagram is provided for each narrative. The codes for the sequence diagrams in Figure 1
to Figure 16 are available at: https://standards.iso.org/iso/t r/31700/-2/ed-1/en/.
Unique identifi-
ID UC 31700-01a
cation
Use case name Meaningful name On line retailing
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 9
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Description of
Short description A service that allows the customers to search, select and purchase
product, service
of product the products, services and information remotely over the Internet
or process
Data and PII provided to or collected by the retailer is limited to
Short description
Privacy protec- information used to complete the sale, delivery, provide a receipt,
of privacy protec-
tion goal enable product or service improvement, and provide customer
tion goals
support.
Customer Privacy Expectation
Customer post purchase privacy expectation
Ecosystem and
Describe systems Online retailers’ transaction system
systems of inter-
of interest Online retailers’ order fulfilment information system
est
Online retailers’ delivery system
Internet service provider information system
Any consumer placing order, including vulnerable persons (e.g.,
Users Describe users
seniors, minors, disabled)
Retailer fulfilment and delivery staff
Order processing system
Delivery system
Describe stake-
Stakeholders Payment system
holders
Return system
Marketing and tracking system
Consumer device (e.g., tablet, smart phone, laptop)
Describe PII pro- Client name, address, email and phone. Credit card information
PII
cessed for payment for processing of order.
Product use pur- Describe purpose The PII is collected by the seller to fulfil the order and enable
pose of PII processing product development and service improvement.
A consumer goes online to find toys for the grandchildren. The
consumer visits several websites, including initiating orders that
the consumer does not complete. The consumer finds an online
retailer and completes an order for 2 items. To fulfil the order,
the consumer provides contact information including delivery
Short narrative address and payment method.
on consumer For the purposes of shipping and order he provides his contact
Main narrative goods and servic- information and address. In order to process payment he enters
es (possibly with his credit card. The online retailer asks if he wants to set up an
a diagram) account. He declines. The online retailer asks if he wants them to
retain the contact information after delivery for future purchases
or returns. The client declines to allow this except related to the
right of return. The online retailer asks some questions regarding
family size, ages and income. The client declines to answer and
declines to receive any information related to new products.
Unique identifi-
ID UC 31700-01b
cation
Use case name Meaningful name On line retailing
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 11
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Unique identifi-
ID UC 31700-01c
cation
Use case name Meaningful name On line retailing
Unique identifi-
ID UC 31700-01d
cation
Use case name Meaningful name On line retailing
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 13
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Unique identifi-
ID UC 31700-01e
cation
Use case name Meaningful name On line retailing
The product management team of the retailer performs an initial
consumer service privacy risk analysis which leads to require-
Describe how ments on consumer support, and requirements on protection of
requirements on data storage. An assessment of supplier providing data storage
Narrative on risk
risk management protection leads to a selected implementation.
management
can help (possibly A periodic privacy risk assessment is carried out. The impact
with a diagram) of the cybersecurity alert on data protection is evaluated. The
consumer support program is also evaluated. They lead to some
minor adjustments
Unique identifi-
ID UC 31700-01f
cation
Use case name Meaningful name On line retailing
Further to the consumer service privacy risk analysis, the de-
Describe how
Narrative on velopment team is mandated to implement a privacy control
requirements for
development, concerning consumer accounts which includes an access control
privacy controls
deployment and policy enforcement and monitoring mechanism, as well as associ-
can help (possibly
operation ated organisation measures concerning rules on which employees
with a diagram)
can access data.
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 15
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Unique identifi-
ID UC 31700-01g
cation
Use case name Meaningful name On line retailing
Describe how Further to the consumer service privacy risk analysis, the de-
requirements velopment team is mandated to implement a privacy control for
Narrative on end for end of PII retirement of the service which includes a mechanism to keep
of PII lifecycle lifecycle can help track of all PII.
(possibly with a Upon retirement, the mechanism is used to securely delete all PII
diagram) that is no longer used or is at the end of the data retention lifecycle
Unique identifi-
ID UC 31700-02a
cation
Use case name Meaningful name Fitness centre
Description of A combined service that allows customers to practice physical
Short description
product, service activities in an external place and track their health info on their
of product
or process mobile phone.
Short description
Privacy protec- Ensure security of health info access on a mobile phone through
of privacy protec-
tion goal biometric verification.
tion goals
Fitness centre information system.
Ecosystem and
Describe systems
systems of inter- Smart phone application.
of interest
est
Smart watch with sensors.
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 17
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Unique identifi-
ID UC 31700-02b
cation
Use case name Meaningful name Fitness company
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 19
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Unique identifi-
ID UC 31700-02c
cation
Use case name Meaningful name Fitness company
Unique identifi-
ID UC 31700-03a
cation
Meaningful
Use case name Smart locks product line
name
The smart locks product line includes the following components
and functions:
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 21
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Description of Short description — connected lock: home Wi-Fi and Internet connected lock with
product, service of product control software to remotely open and close lock on receiving
or process valid control instructions via Wi-Fi as well as opening and
closing under manual control with lock status monitoring
too;
— smart lock application: application on smartphone providing
ability to open and close the lock as well as monitor the
condition of the lock open, closed, deadlocked, and physical
integrity impacted;
— unique smart key: domestic users have a unique smart key
that they control, identified as an initial requirement from
known potential for abusive use;
— recording capability: household recording of smart lock use
by occupants only available for each individual and their
own records and no records access for other adult household
members;
— sharing data: option for householders to share their data re
use of the smart lock with the others in the household; and
— access to children record: the smart lock use record can be
accessible by parents or guardians.
Three use scenarios are considered in this use case:
— basic use: existing smart lock registered householder enters
home from outside using remote control facility;
— colocation use e.g., flat sharing: lock use records shared; and
— family use: data re children’s use of the lock available to
parents.
Short description Ensure privacy of access rights to the home.
Privacy protec-
of privacy pro-
tion goal Ensure privacy and security of any use logs and records.
tection goals
Other products that interwork with the smart lock are:
— smart phones;
Ecosystem and
Describe sys-
systems of inter- — home Wi-Fi routers; and
tems of interest
est
— internet service.
The ecosystem includes organisations in the associated supply
chain in order to ensure that the lifecycle of the used capabilities
is aligned with the smart lock product lifecycle.
— Consumer users
Users Describe users — Householder (entering home)
— Other householders (for lock status update)
Describe stake- Stakeholders who use the smart lock technology
Stakeholders
holders Stakeholders who develop the technology
Purpose 1 Basic use - Personal access control data: it is assumed
that the designers have used the smartphone security capability
to verify access to the phone itself. The data types are:
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 23
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Unique identifi-
ID UC 31700-03b
cation
Meaningful
Use case name Smart locks opening basic
name
Short narrative
on consumer
Main narrative Basic use - Existing smart lock registered householder enters home
goods and ser-
on configuration from outside using the remote control facility
vices (possibly
with a diagram)
Unique identifi-
ID UC 31700-03c
cation
Meaningful
Use case name Smart locks colocation
name
Short narrative
on consumer
Main narrative
goods and ser- Colocation use e.g., flat sharing – lock use records shared
on configuration
vices (possibly
with a diagram)
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 25
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Unique identifi-
ID UC 31700-03d
cation
Meaningful
Use case name Smart locks family
name
Short narrative
on consumer
Main narrative Family use – data re children’s use of the lock available to par-
goods and ser-
on configuration ents
vices (possibly
with a diagram)
Unique identifi-
ID UC 31700-03e
cation
Use case name Meaningful name Smart locks
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 27
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Unique identifi-
ID UC 31700-03f
cation
Use case name Meaningful name Smart locks
Unique identifi-
ID UC 31700-03g
cation
Use case name Meaningful name Smart locks
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 29
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)
Bibliography
[9] ISO/IEC 29134, Information technology — Security techniques — Guidelines for privacy impact
assessment
[10] ISO/IEC/IEEE 29148, Systems and software engineering — Life cycle processes — Requirements
engineering
[11] ISO/IEC 29151, Information technology — Security techniques — Code of practice for personally
identifiable information protection
[12] Zwingelberg Harald, Hansen Marit, Privacy Protection Goals and Their Implications for
eID Systems. 7th PrimeLife International Summer School (PRIMELIFE), Sep 2011, Trento, Italy.
pp.245-260, ff10.1007/978-3-642-31668-5_19ff. ffhal-01517607f
1) https://standards.iso.org/ittf/PubliclyAvailableStandards/index.html
© ISO 2023 – All rights reserved Single user license for: Sammy Chowdhury 31
Order:226083 | Date:11-Mar-2023 | Spring , 77379, United States
Copyright © SIST
ISO/TR 31700-2:2023(E)