Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 201 - 210 of 410
Information technologies — JPEG systems — Part 4: Privacy and security
This document specifies privacy and security features which contribute to a system layer for JPEG standards. It defines generic structures that can be applied in all JPEG box-based file formats. In particular, this document specifies a signalling syntax supporting privacy and security features. The framework in this document is backwards-compatible with existing JPEG standards.
Publisher :
ISO
Status :
Published
Published Date :
2020-03-30
ICS Code(s) :
35.040.30
Information technologies - JPEG systems - Part 4: Privacy and security
This document specifies privacy and security features which contribute to a system layer for JPEG standards. It defines generic structures that can be applied in all JPEG box-based file formats. In particular, this document specifies a signalling syntax supporting privacy and security features. The framework in this document is backwards-compatible with existing JPEG standards.
Publisher :
IEC
Status :
Published
Published Date :
2020-03-30
ICS Code(s) :
35.040.30
Information technology — Genomic information representation — Part 3: Metadata and application progr...
This document specifies information metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces of genomic information. It defines: — metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 (in Clause 6); — protection elements providing confidentiality, integrity and privacy rules at the different…
Publisher :
ISO
Status :
Withdrawn
Published Date :
2020-03-16
ICS Code(s) :
35.040.99
Information technology - Genomic information representation - Part 3: Metadata and application progr...
This document specifies information metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces of genomic information. It defines: — metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 (in Clause 6); — protection elements providing confidentiality, integrity and privacy rules at the different…
Publisher :
IEC
Status :
Revised
Published Date :
2020-03-16
ICS Code(s) :
35.040.99
Information technology — Security techniques — Code of practice for protection of personally identif...
1 Scope This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for the public cloud computing environment. In particular, this document specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Publisher :
CSA
Status :
Standard
Published Date :
2020-02-29
ICS Code(s) :
35.030
Information technology — Guidance for biometric enrolment
1 Scope This document consolidates information relating to successful, secure and usable implementation of biometric enrolment processes, while indicating risk factors that organisations proposing to use biometric technologies will should address during procurement, design, deployment and operation. Much of the information is generic to many types of application, e.g. from national scale…
Publisher :
CSA
Status :
Standard
Published Date :
2020-02-29
ICS Code(s) :
35.240.15
Information technology — Biometric data interchange formats — Part 14: DNA data
1 Scope This part of ISO/IEC 19794 specifies a data interchange format for the exchange of DNA data for person identification or verification technologies that utilize human DNA. It will provide the ability for DNA profile data to be exchanged and used for comparison (subject to privacy regulations) with DNA profile data produced by any other system that is based on a compatible DNA profiling…
Publisher :
CSA
Status :
Standard
Published Date :
2020-02-29
ICS Code(s) :
35.040
Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information managemen...
1 Scope This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization. This document specifies PIMS-related requirements and provides guidance for PII…
Publisher :
CSA
Status :
Standard
Published Date :
2020-02-29
ICS Code(s) :
35.030
Intelligent transport systems — Framework for cooperative telematics applications for regulated comm...
Security requirements address both hardware and software aspects. This document addresses the security requirements for: — the transfer of TARV data from an IVS to an application service provider across a wireless communications interface; — the receipt of instructions from an application service provider to a TARV IVS; — the communications aspects of handling of software updates for…
Publisher :
ISO
Status :
Published
Published Date :
2020-02-17
ICS Code(s) :
03.220.20; 35.240.60
Information technology — Cloud computing — Edge computing landscape
This document examines the concept of edge computing, its relationship to cloud computing and IoT, and the technologies that are key to the implementation of edge computing. This document explores the following topics with respect to edge computing: — concept of edge computing systems; — architectural foundation of edge computing; — edge computing terminology; — software…
Publisher :
ISO
Status :
Published
Published Date :
2020-02-10
ICS Code(s) :
35.210