Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 169 - 180 of 267
Notice of Intent

UN/EDIFACT Message Design Guidelines (Joint CAN...

General Introduction One of the key requirements before organizations can exchange administrative, commercial and transport information between their computers, without manual intervention, is agreement on the content and...
Article

SCC launches AI accreditation lessons learned...

Our AI accreditation pilot revealed essential insights that are now shaping the development of AI management systems accreditation and certification—find them in our newly published lessons learned report . The report...
Notice of Intent

Information technology - Security techniques - ...

This document gives guidelines for — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private...
Notice of Intent

Information technology - Security techniques - ...

This document gives guidelines for — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private...
Notice of Intent

Information technology - Smart City ICT reference...

1 Scope This document specifies a generic knowledge management framework for a smart city, focusing on creating, capturing, sharing, using and managing smart city knowledge. It also gives the key practices which are required...
Notice of Intent

Information technology - Security techniques - ...

This document gives guidelines for: — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private...
Notice of Intent

Information technology - Security techniques - ...

This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Notice of Intent

Information technology - Security techniques - ...

This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...