Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 91 - 100 of 410
Information security, cybersecurity and privacy protection - Information security management systems...
This document specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. This document also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in this document are generic and…
Publisher :
IEC
Status :
Published
Published Date :
2022-10-24
ICS Code(s) :
03.100.70; 35.030
Information security, cybersecurity and privacy protection - Guidance on managing information securi...
This document provides guidance to assist organizations to: — fulfil the requirements of ISO/IEC 27001 concerning actions to address information security risks; — perform information security risk management activities, specifically information security risk assessment and treatment. This document is applicable to all organizations, regardless of type, size or sector.
Publisher :
IEC
Status :
Published
Published Date :
2022-10-24
ICS Code(s) :
35.030
Information technology - Genomic information representation - Part 3: Metadata and application progr...
This document specifies information metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces of genomic information. It defines: — metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 (in Clause 6); — protection elements providing confidentiality, integrity and privacy rules at the different…
Publisher :
IEC
Status :
Published
Published Date :
2022-10-24
ICS Code(s) :
35.040.99
Information security, cybersecurity and privacy protection — Security techniques — Security properti...
This document introduces security properties and provides best practices on the test and evaluation of white box cryptography (WBC). WBC is a cryptographic algorithm specialized for a key or secret, but where the said key cannot be extracted. The WBC implementation can consist of plain source code for the cryptographic algorithm and/or of a device implementing the algorithm. In both cases,…
Publisher :
ISO
Status :
Published
Published Date :
2022-10-19
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection - Security techniques - Security properti...
This document introduces security properties and provides best practices on the test and evaluation of white box cryptography (WBC). WBC is a cryptographic algorithm specialized for a key or secret, but where the said key cannot be extracted. The WBC implementation can consist of plain source code for the cryptographic algorithm and/or of a device implementing the algorithm. In both cases,…
Publisher :
IEC
Status :
Published
Published Date :
2022-10-19
ICS Code(s) :
35.030
Information technology — Biometric data interchange formats — Part 14: DNA data
This document specifies a data interchange format for the exchange of deoxyribonucleic acid (DNA) data for person identification or verification technologies that utilize human DNA. Consideration of laboratory procedures is out of scope of this document. This document provides the ability for DNA profile data to be exchanged and used for comparison (subject to privacy regulations) with DNA…
Publisher :
ISO
Status :
Published
Published Date :
2022-10-13
ICS Code(s) :
35.240.15
Information technology - Biometric data interchange formats - Part 14: DNA data
This document specifies a data interchange format for the exchange of deoxyribonucleic acid (DNA) data for person identification or verification technologies that utilize human DNA. Consideration of laboratory procedures is out of scope of this document. This document provides the ability for DNA profile data to be exchanged and used for comparison (subject to privacy regulations) with DNA…
Publisher :
IEC
Status :
Published
Published Date :
2022-10-13
ICS Code(s) :
35.240.15
Information security, cybersecurity and privacy protection — User-centric privacy preferences manage...
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.
Publisher :
ISO
Status :
Published
Published Date :
2022-10-09
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection - User-centric privacy preferences manage...
This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.
Publisher :
IEC
Status :
Published
Published Date :
2022-10-09
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Guidance on the integrated implementati...
1 Scope This document gives guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 for organizations intending to: a) implement ISO/IEC 27001 when ISO/IEC 20000-1 is already implemented, or vice versa; b) implement both ISO/IEC 27001 and ISO/IEC 20000-1 together; or c) integrate existing management systems based on ISO/IEC 27001 and ISO/IEC 20000-1. This document…
Publisher :
CSA
Status :
Standard
Published Date :
2022-09-30
ICS Code(s) :
03.080.99; 03.080.99