Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 7165 - 7176 of 9263
Notice of Intent

Textile Test Methods - Dimensional Change in ...

This method describes a procedure for determining the shrinkage that may occur in a fabric as a result of dry cleaning. The procedures for determining the dimensional changes as a result of wet cleaning are covered in CAN...
Notice of Intent

Live working – Hand tools for use up to 1 000...

This document is applicable to insulated , insulating and hybrid hand tools used for working live or close to live parts at nominal voltages up to 1 000 V AC and 1 500 V DC. The products designed and manufactured according to...
Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 3: Radio frequency identification (RFID)
This part of ISO/IEC 19762 provides terms and definitions unique to radio frequency identification (RFID) in the area of automatic identification and data capture techniques. This glossary of terms enables the communication...
Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 1: General terms relating to AIDC
This part of ISO/IEC 19762 provides general terms and definitions in the area of automatic identification and data capture techniques on which are based further specialized sections in various technical fields, as well as the...
Information technology - Automatic identification and data capture (AIDC) techniques - Harmonized vocabulary - Part 2: Optically readable media (ORM)
This part of ISO/IEC 19762 provides terms and definitions unique to optically readable media (ORM) in the area of automatic identification and data capture techniques. This glossary of terms enables the communication between...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18014: - identifies the objective of a time-stamping authority; - describes a general model on which time-stamping services are based; - defines time-stamping services; - defines the basic protocols...
Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components
This part of ISO/IEC 15408 defines the assurance requirements of ISO/IEC 15408. It includes the evaluation assurance levels (EALs) that define a scale for measuring assurance for component TOEs, the composed assurance...
Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components
This part of ISO/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common...