Search

Refine Results
Type
Program
Status
Country
Province
City
Period range

From

To

Displaying 2869 - 2880 of 5449
Notice of Intent

Information technology - Security techniques - ...

This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for...
Notice of Intent

Information technology - High efficiency coding...

This document specifies technology that supports the efficient transmission of immersive audio signals and flexible rendering for the playback of immersive audio in a wide variety of listening scenarios. These include home...
Notice of Intent

Information technology - Security techniques - ...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Identification cards - ICC-managed devices - ...

This document defines physical characteristics and test methods for cards with devices, including but not limited to, power supplying devices, displays, sensors, microphones, loudspeakers, buttons or keypads. This document...
Notice of Intent

Information security, cybersecurity and privacy...

This document gives guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 for organizations intending to: a) implement ISO/IEC 27001 when ISO/IEC 20000-1 is already implemented, or vice versa; b)...
Notice of Intent

Amendment 1 - Information technology - Security...

This document specifies the requirements of competence for ISMS professionals leading or involved in establishing, implementing, maintaining and continually improving one or more information security management system...
Notice of Intent

Personal identification - ISO-compliant driving...

The purpose of storing IDL data on machine-readable media on the IDL is to: increase productivity (of data and IDL use), facilitate electronic data exchange, and assist in authenticity and integrity validation. This document...
Notice of Intent

Information technology - Security techniques - ...

Scope: CAN/CSA-ISO/IEC 18033-4:13 (R2017) This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with plaintext, b) keystream generators for producing keystream, and c) object identifiers assigned to...