Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.849
Word version: 14.0.0
0…
4…
4
General description
5
Privacy threats - Description of key issues of Subscriber Privacy Impact (SPI)in 3GPP
6
Solutions / Threat mitigation
7
Privacy guidelines
8
Conclusion
A
OECD privacy principles
B
Privacy regulations
C
Definitions of personal data in different countries or areas
D
The seven foundational principles in Privacy by Design(PbD)
E
GSMA privacy principles
F
Privacy guidelines for writing 3GPP TRs and TSs
$
Change history
4
General description
p. 8
4.1
Communication model
p. 8
4.2
Conceptual view
p. 9
5
Privacy threats - Description of key issues of Subscriber Privacy Impact (SPI)in 3GPP
p. 10
5.1
Introduction to privacy threat section
p. 10
5.2
Privacy category related
p. 10
5.2.1
Key issue #1-1 - Identify protection scope
p. 10
5.2.1.1
Issue details
p. 10
5.2.1.2
Threats
p. 10
5.2.1.3
Potential privacy requirements
p. 10
5.2.2
Key Issue - personal data
p. 10
5.2.2.1
Issue details
p. 10
5.2.2.2
Threats
p. 11
5.2.2.3
Potential privacy requirements
p. 11
5.2.3
Key issue - User and UE identity privacy
p. 11
5.2.3.1
Issue details
p. 11
5.2.3.2
Threats
p. 12
5.2.3.3
Potential privacy requirements
p. 12
5.3
Personal data management lifecycle
p. 12
5.3.1
Key issue - Collecting privacy related information
p. 12
5.3.1.1
Issue details
p. 12
5.3.1.2
Threats
p. 12
5.3.1.3
Potential privacy requirements
p. 12
5.3.2
Key Issue - Storage of personal data
p. 12
5.3.2.1
Issue details
p. 12
5.3.2.2
Threats
p. 13
5.3.2.3
Potential privacy requirements
p. 13
5.3.3
Key issue - Retention of personal data
p. 13
5.3.3.1
Issue details
p. 13
5.3.3.2
Threats
p. 13
5.3.3.3
Potential privacy requirements
p. 13
5.3.4
Key issue - Personal information disclosure in business collaborations
p. 13
5.3.4.1
Issue details
p. 13
5.3.4.2
Threats
p. 13
5.3.4.3
Potential privacy requirements
p. 13
5.3.5
Key issue - User privacy choice
p. 14
5.3.5.1
Issue details
p. 14
5.3.5.2
Threats
p. 14
5.3.5.3
Privacy requirements
p. 14
5.4
Privacy operation and maintenance related
p. 14
5.4.1
Key Issue - Privacy vs. system functionality
p. 14
5.4.1.1
Issue details
p. 14
5.4.1.2
Threats
p. 14
5.4.1.3
Potential privacy requirements
p. 14
5.4.2
Key Issue - Privacy role
p. 15
5.4.2.1
Issue details
p. 15
5.4.2.2
Threats
p. 15
5.4.2.3
Potential privacy requirements
p. 15
6
Solutions / Threat mitigation
p. 15
6.1
Guidance on applicability
p. 15
6.2
Solution #1 - Privacy identification process
p. 15
6.2.0
Introduction
p. 15
6.2.1
General description
p. 15
6.1.2
Implementation
p. 16
6.2a
Threat mitigation - Data minimization
p. 18
6.3
Threat mitigation- access control
p. 18
6.3.1
Introduction
p. 18
6.3.2
Use case
p. 18
6.4
Threat mitigation - anonymity
p. 18
6.4.1
Introduction
p. 18
6.4.2
Use case: UMTS authentication procedure
p. 19
6.5
Threat mitigation- explicit user consent
p. 19
6.5.1
Introduction
p. 19
6.5.2
Use case
p. 19
7
Privacy guidelines
p. 20
7.0
Introduction
p. 20
7.1
Impacts and consequences
p. 20
7.2
Guidelines
p. 20
8
Conclusion
p. 21
A
OECD privacy principles
p. 21
A.1
OECD privacy principles
p. 21
A.1.0
Introduction
p. 21
A.1.1
Collection limitation principle
p. 21
A.1.2
Data quality principle
p. 22
A.1.3
Purpose specification principle
p. 22
A.1.4
Use limitation principle
p. 22
A.1.5
Security safeguards principle
p. 22
A.1.6
Openness principle
p. 22
A.1.7
Individual participation principle
p. 22
A.1.8
Accountability principle
p. 22
B
Privacy regulations
p. 23
C
Definitions of personal data in different countries or areas
p. 24
D
The seven foundational principles in Privacy by Design(PbD)
p. 26
E
GSMA privacy principles
p. 27
F
Privacy guidelines for writing 3GPP TRs and TSs
p. 28
F.1
Scope
p. 28
F.2
Introduction
p. 28
F.3
Threats
p. 28
F.4
Mitigation techniques
p. 29
F.5
Privacy identification process
p. 30
F.6
Guidance for privacy considerations
p. 31
$
Change history
p. 31