Information technology — Security techniques — Guidelines for privacy impact assessment
This document gives guidelines for:
— a process on privacy impact assessments, and
— a structure and content of a PIA report.
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.
This document is relevant to those involved in designing or implementing projects, including the parties…
Information technology - Security techniques - Guidelines for privacy impact assessment
This document gives guidelines for:
— a process on privacy impact assessments, and
— a structure and content of a PIA report.
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.
This document is relevant to those involved in designing or implementing projects, including the parties…
Data Governance - Part 8: Framework for Geo-Residency and Sovereignty
This Standard aims to specify the minimum requirements for Organizations to protect data assets in
their custody from jurisdictional risks, while taking advantage of the global technology ecosystem.
The Standard is not intended to prescribe how an Organization should implement specific security
controls. Instead, the standard will guide Organizations using jurisdictional and technology-…
Data quality — Part 51: Data governance: Exchange of data policy statements
This document specifies requirements that support the exchange of data governance policy statements and automated conformance testing of data sets to the data specifications referenced by policy statements.
The following are within the scope of this document:
— requirements for the syntax and semantics of identifiers for organizations issuing data governance policy statements;
— …
Information technology — Governance of IT — Governance implications of the use of artificial intelli...
1 Scope
This document provides guidance for members of the governing body of an organization to enable and govern the use of Artificial Intelligence (AI), in order to ensure its effective, efficient and acceptable use within the organization.
This document also provides guidance to a wider community, including:
— executive managers;
— external businesses or technical specialists, such as…
This Standard specifies minimum requirements for zero-copy integration and includes a set of guidelines
for building modular capabilities within a controlled data management environment which can be
applied either as stand-alone experiences or combined into advanced solutions.
This Standard provides a blueprint for IT and other leaders who rely on organizational data integrity to
perform…
Data Governance – Part 4: Scalable Remote Access Infrastructure
This standard presents a set of requirements to help organizations mitigate security risks associated
with, and scalability demands upon, enterprise technologies used for remote access.
The standard also provides guidance to organizations needing to react to unprecedented and unplanned
shifts in their workforce to support work-from-home mandates.
This standard applies to all organizations,…
Smart community infrastructures — Data framework for infrastructure governance based on digital tech...
This document provides a framework for the application of digital technologies in smart community infrastructures to improve the capacity of digital governance of infrastructure.
This framework is applicable to infrastructure governance in smart cities and is intended to be a basic data framework for infrastructure governance. It can establish the basis for future standardization of smart city…
Information security, cybersecurity and privacy protection – Privacy enhancing data de-identificatio...
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller’s behalf,…
Information security, cybersecurity and privacy protection – Privacy enhancing data de-identificatio...
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller’s behalf,…