1     Scope  
 2     References  
 3     Definitions   
        3.1   
 Terms defined elsewhere     
        3.2   
 Terms defined in this Recommendation        
 4     Abbreviations
and acronyms         
 5     Conventions      
 6     Overview    
 7     B2C
applications using tag-based identification      
 8     Reference
model for B2C applications using tag-based identification          
 9     PII
infringement in B2C applications using tag-based identification  
        9.1     Leakage of information associated with the identifier            
        9.2     Leakage of the
historical context data          
        9.3     Relationship between PII infringements and the reference model       
10     PII
protection requirements for B2C applications using tag-based identification     
       10.1     Control of PII by ID tag user and/or ID terminal user          
       10.2     Authentication for ID tag user and/or ID terminal user         
       10.3     Access control to the PII of an ID tag user in an application server  
       10.4     Data confidentiality of information associated to an ID tag   
       10.5     Consent for collection of PII          
       10.6     Technical safeguards for the application servers      
       10.7     Relationship between requirements and
PII infringements    
Annex A – Basic principles of
national application     
Annex B
– Basic principles of international application: free
flow and legitimate restrictions     
Appendix I – Location tracking by the identifier in
RFID services     
Appendix II – PII protection service (PPS) for
applications using tag-based identification     
       II.1     PII protection service (PPS) for applications using tag-based
identification    
       II.2     Service entities of the PPS for applications using tag-based
identification       
       II.3     General service scenario for the PPS           
       II.4     Functions of the PPS           
Bibliography