Information technology - Cloud computing - Edge computing landscape
This document examines the concept of edge computing, its relationship to cloud computing and IoT, and the technologies that are key to the implementation of edge computing. This document explores the following topics with respect to edge computing:
— concept of edge computing systems;
— architectural foundation of edge computing;
— edge computing terminology;
— software…
Information security, cybersecurity and privacy protection — Guidelines for information security man...
This document provides guidance on managing an information security management system (ISMS) audit programme, on conducting audits, and on the competence of ISMS auditors, in addition to the guidance contained in ISO 19011.
This document is applicable to those needing to understand or conduct internal or external audits of an ISMS or to manage an ISMS audit programme.
Information security, cybersecurity and privacy protection - Guidelines for information security man...
This document provides guidance on managing an information security management system (ISMS) audit programme, on conducting audits, and on the competence of ISMS auditors, in addition to the guidance contained in ISO 19011.
This document is applicable to those needing to understand or conduct internal or external audits of an ISMS or to manage an ISMS audit programme.
Information technology — Biometric performance testing and reporting — Part 9: Testing on mobile dev...
This document provides guidance for performance testing of biometrics when this technology is used on mobile devices with local biometric authentication to improve authentication assurance.
This document aims to:
— Provide guidance for affordable and cost-efficient testing and reporting methods for performance assessment at a full system level of biometric systems embedded in mobile devices…
Information technology - Biometric performance testing and reporting - Part 9: Testing on mobile dev...
This document provides guidance for performance testing of biometrics when this technology is used on mobile devices with local biometric authentication to improve authentication assurance.
This document aims to:
— Provide guidance for affordable and cost-efficient testing and reporting methods for performance assessment at a full system level of biometric systems embedded in mobile devices…
Privacy enhancing data de-identification terminology and classification of techniques
1 Scope
This document provides a description of privacy-enhancing data de-identification techniques, to be used to describe and design de-identification measures in accordance with the privacy principles in ISO/IEC 29100.
In particular, this document specifies terminology, a classification of de-identification techniques according to their characteristics, and their applicability for reducing…
Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
1 Scope
This document provides guidance for:
— selecting and specifying security functional requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII);
— the procedure to define both privacy and security functional requirements in a coordinated manner; and
— developing privacy functional requirements as extended components based on the privacy principles…
Ethical design and use of automated decision systems
This Standard specifies minimum requirements in protecting human values and incorporating ethics in the design and use of automated decision systems.
This Standard is limited to artificial intelligence (AI) using machine learning for automated decisions.
This Standard applies to all organizations, including public and private companies, government entities, and not-for-profit organizations. It…
Information technology — Security techniques — Privacy architecture framework
1 Scope
This document defines a privacy architecture framework that:
— specifies concerns for ICT systems that process PII;
— lists components for the implementation of such systems; and
— provides architectural views contextualizing these components.
This document is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining, administering and…
Electronic fee collection — Requirements for EFC application interfaces on common media
This document defines requirements to support information exchanges among related entities of a common payment scheme. It defines:
a) electronic fee collection (EFC) functional requirements for a common payment medium;
b) an application structure in a common payment medium;
c) EFC application data in a common payment medium.
The following are outside the scope of this document:
—…