Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 281 - 290 of 2984
Information technology — Biometric data interchange formats — Part 7: Signature/sign time series dat...
This document specifies data interchange formats for signature/sign behavioural data captured in the form of a multi-dimensional time series using devices such as digitizing tablets or advanced pen systems. The data interchange formats are generic, in that they can be applied and used in a wide range of application areas where handwritten signs or signatures are involved. No application-specific…
Publisher :
ISO
Status :
Published
Published Date :
2021-10-28
ICS Code(s) :
35.240.15
Information technology - Biometric data interchange formats - Part 7: Signature/sign time series dat...
This document specifies data interchange formats for signature/sign behavioural data captured in the form of a multi-dimensional time series using devices such as digitizing tablets or advanced pen systems. The data interchange formats are generic, in that they can be applied and used in a wide range of application areas where handwritten signs or signatures are involved. No application-specific…
Publisher :
IEC
Status :
Published
Published Date :
2021-10-28
ICS Code(s) :
35.240.15
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data…
Publisher :
ISO
Status :
Published
Published Date :
2021-10-21
ICS Code(s) :
35.030
Information security - Key management - Part 3: Mechanisms using asymmetric techniques
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data…
Publisher :
IEC
Status :
Published
Published Date :
2021-10-21
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Guidelines on personally identifiable i...
This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying: —    a harmonized terminology for PII deletion; —    an approach for defining deletion rules in an efficient way; —    a description of required documentation; —    a broad definition of roles, responsibilities and…
Publisher :
ISO
Status :
Published
Published Date :
2021-10-07
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection - Guidelines on personally identifiable i...
This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying: — a harmonized terminology for PII deletion; — an approach for defining deletion rules in an efficient way; — a description of required documentation; — a broad definition of roles, responsibilities and…
Publisher :
IEC
Status :
Published
Published Date :
2021-10-07
ICS Code(s) :
35.030
Mine closure and reclamation planning — Part 1: Requirements
This document specifies a framework and the processes involved in mine closure and reclamation planning for new and operating mines. Requirements and recommendations are provided on: —    mine closure and reclamation plan objectives and commitments; —    technical procedures and techniques; —    mitigation of socio-economic impacts; —    financial assurance and associated planning; —    mine…
Publisher :
ISO
Status :
Published
Published Date :
2021-10-05
ICS Code(s) :
73.020
Appareillage à haute tension - Partie 1: Spécifications communes pour appareillage à courant alterna...
L’IEC 62271:2017+A1:2021 s'applique à l'appareillage à courant alternatif prévu pour être installé à l'intérieur et/ou à l'extérieur et pour fonctionner à des fréquences de service inférieures ou égales à 60 Hz, et ayant des tensions assignées supérieures à 1 000 V. Ce document s'applique à tout l'appareillage à haute tension, sauf spécification contraire dans les…
Publisher :
IEC
Status :
Published
Published Date :
2021-10-03
ICS Code(s) :
29.130.10; 29.130.99
Capteurs piézoélectriques - Partie 1: Spécifications génériques
IEC 63041-1:2021 est disponible sous forme de IEC 63041-1:2021 RLV qui contient la Norme internationale et sa version Redline, illustrant les modifications du contenu technique depuis l'édition précédente. L'IEC 63041-1:2021 s'applique aux capteurs piézoélectriques de type résonateur, de type à ligne à retard et de type non acoustique, utilisés en sciences physiques, en sciences…
Publisher :
IEC
Status :
Published
Published Date :
2021-09-16
ICS Code(s) :
31.140
Dispositifs d'interconnexion et composants passifs fibroniques - Norme de performance - Partie ...
IEC 61753-111-09:2021 contient les essais minimaux, ainsi que les sévérités d’essai et les exigences de mesure minimales auxquels il est nécessaire qu’un boîtier à fibres optiques étanche satisfasse afin de pouvoir être classé comme satisfaisant à la norme IEC pour la catégorie S – Souterrains, telle qu’elle est définie dans le Tableau A.15 de l’IEC 61753‑1:2018. Cette première édition annule et…
Publisher :
IEC
Status :
Published
Published Date :
2021-09-13
ICS Code(s) :
33.180.20