Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
GLP Area of Expertise
Fields of Compliance
Period range

From

To

Displaying 25 - 36 of 151
Information technology — Business Operational View — Part 8: Identification of privacy protection requirements as external constraints on business transactions
1 Scope This part of ISO/IEC 15944: provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in Business Operational View (BOV) specifications for...
Notice of Intent

Security techniques - Extension to ISO/IEC 27001...

This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and...
Notice of Intent

Information technology - Business operational...

This document: provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in business operational view (BOV) specifications for identifying the additional...
Notice of Intent

Information technology - Online privacy notices...

This document specifies controls which shape the content and the structure of online privacy notices as well as the process of asking for consent to collect and process personally identifiable information (PII) from PII...
Notice of Intent

Information technology -- Security techniques...

This document defines a privacy architecture framework that: — specifies concerns for ICT systems that process PII; — lists components for the implementation of such systems; and — provides architectural views contextualizing...
Notice of Intent

Information technology - Security techniques - ...

This document defines a privacy architecture framework that: — specifies concerns for ICT systems that process PII; — lists components for the implementation of such systems; and — provides architectural views contextualizing...
Notice of Intent

Information technology - Security techniques - ...

This document gives guidelines for — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private...
Notice of Intent

Information technology - Security techniques - ...

This document gives guidelines for — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private...
Notice of Intent

Information technology -- Security techniques...

This International Standard defines a privacy architecture framework that: — specifies concerns for ICT systems that process PII; — lists components for the implementation of such systems; and — provides architectural views...
Notice of Intent

Data governance: Third party data access and ...

Please note that the title, designation number, scope was updated on 2019-08-07 as requested by the responsible SDO, and an additional comment period of August 7, 2019 to August 28, 2019 applies. This Standard specifies...