Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8269 - 8280 of 9144
Notice of Intent

Amendment 1 - Cards and security devices for ...

Scope: CSA ISO/IEC 14443-2 This document specifies the characteristics of the fields to be provided for power and bi-directional communication between proximity coupling devices (PCDs) and proximity cards or objects (PICCs)...
Notice of Intent

Information security - Time-stamping services...

This document specifies mechanisms that generate, renew, and verify independent time-stamps. In order to verify an independent time-stamp token, time-stamp verifiers do not need access to any other time-stamp tokens. That is...
Notice of Intent

Cybersecurity - Supplier relationships - Part...

This document is an introductory part of ISO/IEC 27036. It provides an overview of the guidance intended to assist organizations in securing their information and information systems within the context of supplier...
Notice of Intent

Standard for wind turbine tower elevators

ASME A17.8/CSA B44.8 applies to elevators permanently installed in a wind turbine tower to provide vertical transportation of authorized personnel and their tools and equipment only. Such elevators are typically subjected to...
Notice of Intent

Energy management systems — Guidelines for a ...

This document gives guidance for organizations on establishing a phased approach to implement an energy management system (EnMS). Theis phased approach is intended to support a simplify implementation of an EnMS for all types...
Notice of Intent

Identification cards - Integrated circuit cards...

This document specifies interindustry commands which can be used for security operations. This document also provides informative directives on how to construct security mechanisms with commands defined in ISO/IEC 7816-4. The...
Notice of Intent

Information security - Message authentication...

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that...