Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3229 - 3240 of 11740
Notice of Intent

Information technology - Telecommunications and...

This standard defines several media independent services (MIS); handover, home energy management system (HEMS), software-defined radio access networks (SDRANs), radio resource management (RRM), and device-to-device (D2D)...
Notice of Intent

Information technology - Security techniques - ...

This document specifies security guidelines for the design and implementation of VSs. Design considerations focusing on identifying and mitigating risks, and implementation recommendations with respect to typical VSs are...
Notice of Intent

Information technology - Security techniques - ...

This document: — gives guidelines for the identity proofing of a person; — specifies levels of identity proofing, and requirements to achieve these levels. This document is applicable to identity management systems.
Notice of Intent

Information technology - Security techniques - ...

This document provides the overview of information security management systems (ISMS). It also provides terms and definitions commonly used in the ISMS family of standards. This document is applicable to all types and sizes...
Notice of Intent

Information technology -- Security techniques...

This document defines a privacy architecture framework that: — specifies concerns for ICT systems that process PII; — lists components for the implementation of such systems; and — provides architectural views contextualizing...
Notice of Intent

Data governance – Data protection of digital ...

This proposed standard aims to specify minimum requirements for the data protection of all digital assets at-rest, in-motion, and in-use across platforms (e.g., endpoints, mobile, cloud), facilitating secure sharing and...