Information security, cybersecurity and privacy protection - Guidelines on personally identifiable i...
This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying:
— a harmonized terminology for PII deletion;
— an approach for defining deletion rules in an efficient way;
— a description of required documentation;
— a broad definition of roles, responsibilities and…
Information technology for learning, education and training — Reference framework of e-Portfolio inf...
1 Scope
This document specifies a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and personal development.
The reference framework identifies content and functional…
Information technology — Big data reference architecture — Part 4: Security and privacy
1 Scope
This document specifies the security and privacy aspects applicable to the big data reference architecture (BDRA) including the big data roles, activities and functional components and also provides guidance on security and privacy operations for big data.
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part ...
1 Scope
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF.
Amongst PUF use…
Information technology for learning, education and training — Nomadicity and mobile technologies
1 Scope
This document provides a learner information model specific to mobile learning to enable learning, education and training environments to reflect the specific needs of mobile participants.
This document provides:
— definitions of mobile technology and mobile learning appropriate for all sectors in learning, education and training;
— a description of the learner information model for…
Information security, cybersecurity and privacy protection — Governance of information security
1 Scope
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization.
The intended audience for this document is:
— governing body and top management;
— those who are responsible for evaluating, directing…
Information technology — Learning, education, and training — Metadata for facilitators of online lea...
This document specifies a metadata structure to store, present and exchange online learning facilitator (OLF) information by specifying the data elements and their attributes to describe facilitator’s information on various kinds of online education platforms.
This document provides a generic information model of OLF to describe relevant information that applies to the facilitation and training…
Information technology - Learning, education, and training - Metadata for facilitators of online lea...
This document specifies a metadata structure to store, present and exchange online learning facilitator (OLF) information by specifying the data elements and their attributes to describe facilitator’s information on various kinds of online education platforms.
This document provides a generic information model of OLF to describe relevant information that applies to the facilitation and training…