Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 1 - 10 of 392
Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment...
This document provides guidelines for identity-related risk, as an extension of ISO 31000:2018. More specifically, it uses the process outlined in ISO 31000 to guide users in establishing context and assessing risk, including providing risk scenarios for processes and implementations that are exposed to identity-related risk. This document is applicable to the risk assessment of processes and…
Publisher :
ISO
Status :
Published
Published Date :
2024-06-30
ICS Code(s) :
03.100.01; 35.030
Information security, cybersecurity and privacy protection - Application of ISO 31000 for assessment...
This document provides guidelines for identity-related risk, as an extension of ISO 31000:2018. More specifically, it uses the process outlined in ISO 31000 to guide users in establishing context and assessing risk, including providing risk scenarios for processes and implementations that are exposed to identity-related risk. This document is applicable to the risk assessment of processes and…
Publisher :
IEC
Status :
Published
Published Date :
2024-06-30
ICS Code(s) :
03.100.01; 35.030
Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.
Publisher :
ISO
Status :
Published
Published Date :
2024-06-24
ICS Code(s) :
35.030
Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.
Publisher :
IEC
Status :
Published
Published Date :
2024-06-24
ICS Code(s) :
35.030
Health informatics — Workforce roles and capabilities for terminology and terminology services in he...
This document specifies the tasks, roles, and key skills, requirements and competencies for personnel involved in terminology services in healthcare organizations. This document specifies: —     terminology services in healthcare organizations including the selection, authoring, and deployment and use of terminology subsets, data sets and maps; developing and managing terminology management…
Publisher :
ISO
Status :
Published
Published Date :
2024-05-14
ICS Code(s) :
35.240.80
Information technology — Business operational view — Part 17: Fundamental principles and rules gover...
This document: a)       focuses on PbD aspects of privacy protection requirements as external constraints on any type of Person, (e.g. organization or public administration) involved in any kind of business transaction among such Persons which involves the electronic data interchange (EDI) of any personal information; b)       establishes a fundamental set of privacy principles known as Privacy…
Publisher :
ISO
Status :
Published
Published Date :
2024-04-08
ICS Code(s) :
35.240.63
Information technology - Business operational view - Part 17: Fundamental principles and rules gover...
This document: a) focuses on PbD aspects of privacy protection requirements as external constraints on any type of Person, (e.g. organization or public administration) involved in any kind of business transaction among such Persons which involves the electronic data interchange (EDI) of any personal information; b) establishes a fundamental set of privacy principles known as Privacy…
Publisher :
IEC
Status :
Published
Published Date :
2024-04-08
ICS Code(s) :
35.240.63
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hard...
This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target entity, objective pattern, and method of deployment. Moreover, this document summarizes the possible ways of utilizing monitoring technologies for hardware security…
Publisher :
ISO
Status :
Published
Published Date :
2024-04-02
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection - Hardware monitoring technology for hard...
This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target entity, objective pattern, and method of deployment. Moreover, this document summarizes the possible ways of utilizing monitoring technologies for hardware security…
Publisher :
IEC
Status :
Published
Published Date :
2024-04-02
ICS Code(s) :
35.030
Privacy - Part 2: Canadian Information Privacy Protection Framework
Scope This standard specifies minimum requirements for organizations that access, collect, use, retain, and disclose personal information, and offers any benefit or consideration regardless of monetary exchange for such benefit or consideration. The standard aims to provide a baseline framework for organizations seeking to harmonize conformance to the various provincial/territorial, federal,…
Publisher :
DGSI
Status :
Standard
Published Date :
2024-03-31
ICS Code(s) :
03.100.02