Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 401 - 410 of 410
IT Security and Privacy — A framework for identity management — Part 2: Reference architecture and r...
This document: •       provides guidelines for the implementation of systems for the management of identity information, and •       specifies requirements for the implementation and operation of a framework for identity management. This document is applicable to any information system where information relating to identity is processed or stored." to “This document: ·       provides…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Cybersecurity — IoT security and privacy — Cybersecurity labelling framework for consumer IoT
This document defines a Universal Cybersecurity Labelling Framework for the development and implementation of cybersecurity labelling programmes for consumer IoT products and includes guidance on the following topics: • Risks and threats associated with consumer IoT products; • Stakeholders, roles and responsibilities; • Relevant standards and guidance documents; • Conformity assessment options…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030; 35.240.95
Information technology, cybersecurity and privacy protection — Age assurance systems — Part 1: Frame...
This document establishes core principles, including privacy and security, for the purpose of enabling age-related eligibility decisions.
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation base...
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy by reducing the risks associated with the sharing or transmission of personal data between organisations and users by minimizing the information shared. It will include several ZKP functional requirements relevant to a range of different business use cases, then describes how different ZKP models can be used…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection – Controls and guidance for personally id...
ISO/IEC 29151:2017 establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII). In particular, this Recommendation | International Standard specifies guidelines based on ISO/IEC 27002, taking into consideration the requirements for…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Electronic fee collection — Requirements for EFC application interfaces on common media
This document defines requirements to support information exchanges among related entities of a common payment scheme. It defines: a) electronic fee collection (EFC) functional requirements for a common payment medium; b) an application structure in a common payment medium; c) EFC application data in a common payment medium. The following are outside the scope of this document: —…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
03.220.20; 35.240.60
Information security, cybersecurity and privacy protection – Guidelines for protection of personally...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for the public cloud computing environment. In particular, this document specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Information technology — Genomic information representation — Part 3: Metadata and application progr...
This document specifies information metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces of genomic information. It defines: —    metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 (in Clause 6); —    protection elements providing confidentiality, integrity and privacy rules at the different…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.040.99
Security and resilience — Authenticity, integrity and trust for products and documents — Framework f...
This document provides an approach that support stakeholders in a supply chain to accomplish a chain of trust regarding properties of identifiable material goods along a supply chain. This document gives guidance on the identification of trust domains and their corresponding trustworthiness attributes, and the measures to achieve the targeted trustworthiness attributes. As a supply chain…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
03.100.01
Information security, cybersecurity and privacy protection — Requirements for the competence of IT s...
This document provides the specialized requirements to demonstrate the competence of individuals in performing IT product security evaluations and certifications in accordance with the ISO/IEC 15408 series and ISO/IEC 18045.
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030