Information technology — Use of biometrics in video surveillance systems — Part 1: System design and...
1 Scope
The ISO 30137 series is applicable to the use of biometrics in VSS (also known as Closed Circuit Television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities such as gait…
Information technology — Security techniques — Privacy engineering for system life cycle processes
1 Scope
This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes:
— the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management); and
— privacy engineering activities in key engineering…
Information technology for learning, education and training — Learning analytics interoperability — ...
1 Scope
This document specifies privacy and data protection requirements and attributes to inform design of learning analytics systems and learning analytics practices in schools, universities, workplace learning and blended learning settings.
Acoustics — Measurement of speech level reduction of furniture ensembles and enclosures — Part 1: La...
This document specifies a laboratory method to facilitate the comparison of furniture ensembles and enclosures with respect to their ability to reduce the speech level of the occupant speaking inside the product.
In this method, the sound power level is measured in two scenarios: 1) without the product, and 2) with the product. During scenario 1), the test signal is produced by the sound source…
Personal identification — ISO-compliant driving licence — Part 2: Machine-readable technologies
The purpose of storing IDL data on machine-readable media on the IDL is to:
— increase productivity (of data and IDL use),
— facilitate electronic data exchange, and
— assist in authenticity and integrity validation.
This document thus specifies the following:
— mandatory and optional machine-readable data;
— the logical data structure;
— encoding rules for the machine-…
Personal identification - ISO-compliant driving licence - Part 2: Machine-readable technologies
The purpose of storing IDL data on machine-readable media on the IDL is to:
— increase productivity (of data and IDL use),
— facilitate electronic data exchange, and
— assist in authenticity and integrity validation.
This document thus specifies the following:
— mandatory and optional machine-readable data;
— the logical data structure;
— encoding rules for the machine-…
Information technology — Online privacy notices and consent
This document specifies controls which shape the content and the structure of online privacy notices as well as the process of asking for consent to collect and process personally identifiable information (PII) from PII principals.
This document is applicable in any online context where a PII controller or any other entity processing PII informs PII principals of processing.
Information technology - Online privacy notices and consent
This document specifies controls which shape the content and the structure of online privacy notices as well as the process of asking for consent to collect and process personally identifiable information (PII) from PII principals.
This document is applicable in any online context where a PII controller or any other entity processing PII informs PII principals of processing.
Information technology — Artificial intelligence — Overview of trustworthiness in artificial intelli...
This document surveys topics related to trustworthiness in AI systems, including the following:
— approaches to establish trust in AI systems through transparency, explainability, controllability, etc.;
— engineering pitfalls and typical associated threats and risks to AI systems, along with possible mitigation techniques and methods; and
— approaches to assess and achieve…
Information technology - Artificial intelligence - Overview of trustworthiness in artificial intelli...
This document surveys topics related to trustworthiness in AI systems, including the following:
— approaches to establish trust in AI systems through transparency, explainability, controllability, etc.;
— engineering pitfalls and typical associated threats and risks to AI systems, along with possible mitigation techniques and methods; and
— approaches to assess and achieve…