Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8821 - 8832 of 9374
Notice of Intent

Identification cards - Integrated circuit cards...

This document aims to normalize privacy-enhancing protocols and services by — using the mechanisms from parts of ISO/IEC 7816 and parts of ISO/IEC 18328 that contribute to security and privacy — providing discoverability...
Notice of Intent

Information technology - Data centre facilities...

This document specifies processes for the management and operation of data centres. The primary focus of this document is the operational processes necessary to deliver the expected level of resilience, availability, risk...
Notice of Intent

Information technology - Coded representation...

This document specifies the omnidirectional media format for coding, storage, delivery, and rendering of omnidirectional media, including video, images, audio, and timed text. In an OMAF player the user's viewing perspective...
Notice of Intent

Preparation and quality management of fluids ...

This document specifies minimum requirements for water to be used in haemodialysis and related therapies. This document includes water to be used in the preparation of concentrates, dialysis fluids for haemodialysis...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18014 -describes a general model for time-stamping services producing linked tokens -describes the basic components used to construct a time-stamping service producing linked tokens -defines the data...
Notice of Intent

Information security management — Guidelines ...

This document provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organization’s information security risk management framework. This...
Notice of Intent

IT Security techniques — Entity authentication...

This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of...