Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 541 - 552 of 1752
Notice of Intent

Configuration Management for Reactor Facilities...

The scope of this project is to produce a new standard that provides requirements and guidance to be applied for the development and implementation of configuration management (CM) processes at Canadian nuclear facilities
Notice of Intent

First Responder Fatigue Risk Management

The scope of this project is to develop an evidence-informed National Standard on First Responder Workplace Fatigue Risk Management and related tools which will be used across Canada to improve first responder health and...
Notice of Intent

Information technology - Service management - ...

This Standard provides guidance on the relationship between ISO/IEC 20000‑1:2011 and CMMI-SVC V1.3 (through Maturity Level 3). Service providers can refer to this guidance as a cross-reference between the two documents to...
Notice of Intent

Information technology - Service management — ...

This document provides guidance on the relationship between ISO/IEC 20000-1:2011 and CMMI-SVC V1.3 (through Maturity Level 3). Service providers can refer to this guidance as a cross-reference between the two documents to...
Notice of Intent

Information technology - Cloud Data Management...

1 Scope This CDMI™ International Standard specifies the interface to access cloud storage and to manage the data stored therein. This International Standard applies to developers who are implementing or using cloud storage.
Notice of Intent

IT Security techniques - Key management - Part...

This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key...
Notice of Intent

IT Security techniques - Key management - Part...

This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key...