{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fcyberlawissues.hatenablog.com%2Fentry%2F2020%2F07%2F27%2F143500\" title=\"ISO\u95a2\u9023 - IT\u3092\u3081\u3050\u308b\u6cd5\u5f8b\u554f\u984c\u306b\u3064\u3044\u3066\u8003\u3048\u308b\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","url":"https://cyberlawissues.hatenablog.com/entry/2020/07/27/143500","height":"190","title":"ISO\u95a2\u9023","type":"rich","provider_url":"https://hatena.blog","image_url":null,"author_name":"cyberlawissues","author_url":"https://blog.hatena.ne.jp/cyberlawissues/","version":"1.0","width":"100%","categories":["\u60c5\u5831\u6cd5"],"description":"ISO\u95a2\u9023\u5099\u5fd8\u30e1\u30e2\u3002 ISO/IEC 29134:2017 \u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u5f71\u97ff\u8a55\u4fa1Information technology \u2014 Security techniques \u2014 Guidelines for privacy impact assessment ISO/IEC 29100:2011 \u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30afInformation technology \u2014 Security techniques \u2014 Privacy frameworkJIS X 9250:2017 ISO/IEC 29151:2017 Information technology \u2014 Security techniq\u2026","published":"2020-07-27 14:35:00","blog_url":"https://cyberlawissues.hatenablog.com/","provider_name":"Hatena Blog","blog_title":"IT\u3092\u3081\u3050\u308b\u6cd5\u5f8b\u554f\u984c\u306b\u3064\u3044\u3066\u8003\u3048\u308b"}