Search

Refine Results
Type
Status
Period range

From

To

Displaying 13 - 24 of 41
Notice of Intent

Discovery and management of Digital Twins for...

Note: NOI for CAN-CIOSC 106 Series https://www.scc.ca/en/standards/notices-of-intent/ciosc/series-standards-for-discovery-and-management-digital-twins-for-built-environments The following are within the scope of this Part of...
Notice of Intent

Information technology - Artificial intelligence...

This document provides guidance on how organizations that develop, produce, deploy or use products, systems and services that utilize artificial intelligence (AI) can manage risk specifically related to AI. The guidance also...
Notice of Intent

Information security, cybersecurity and privacy...

This document specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This document also includes...
Notice of Intent

Information security, cybersecurity and privacy...

This document provides guidance to assist organizations to: — fulfil the requirements of ISO/IEC 27001 concerning actions to address information security risks; — perform information security risk management activities...
Notice of Intent

Information technology - Security techniques - ...

This document gives guidelines for: — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private...
Notice of Intent

Information technology - Information security...

This document is the foundation of the ISO/IEC 27035 series. It presents basic concepts, principles and process with key activities of information security incident management, which provide a structured approach to preparing...
Notice of Intent

Information technology - Information security...

This document is the foundation of the ISO/IEC 27035 series. It presents basic concepts, principles and process with key activities of information security incident management, which provide a structured approach to preparing...