Charities – Governance and Best Management Practices
1 PURPOSE
This standard specifies the requirements with respect to the governance and best management
practices for charitable organizations.
2 SCOPE
This standard applies to all charities registered with the Canada Revenue Agency that want to
implement and maintain best management practices.
This document was developed to serve as a reference document for conformity assessment activities
of…
Household electric cooking appliances - Part 1: Ranges, ovens, steam ovens and grills - Methods for ...
IEC 60350-1:2011 specifies methods for measuring the performance of electric cooking ranges, ovens, steam ovens, and grills for household use. The ovens covered by this standard may be with or without microwave function. This standard defines the main performance characteristics of these appliances which are of interest to the user and specifies methods for measuring these characteristics. This…
Household electric cooking appliances - Part 2: Hobs - Methods for measuring performance
IEC 60350-2:2011 defines methods for measuring the performance of electric hobs for household use. Appliances covered by this standard may be built-in or for placing on a working surface or the floor. The hob can also be a part of a cooking range. This standard defines the main performance characteristics of these appliances which are of interest to the user and specifies methods for measuring…
Information technology — MPEG systems technologies — Part 4: Codec configuration representation
ISO/IEC 23001-4:2011 defines the methods and general principles capable of describing codec configurations in the so-called reconfigurable video-coding (RVC) framework. It primarily addresses reconfigurable video aspects and will only focus on the description of representation for video codec configurations within the RVC framework.
Within the scope of the RVC framework, two languages, namely…
Information technology — Security techniques — Key management — Part 5: Group key management
ISO/IEC 11770-5:2011 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.
It defines the symmetric key based key establishment mechanisms for multiple entities with a key distribution centre (KDC), and defines symmetric key…
Information technology — Security techniques — Signcryption
ISO/IEC 29150:2011 specifies four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs. The methods specified in ISO/IEC 29150:2011 have been designed to maximize the level of security and provide efficient processing of data. All the mechanisms defined have…
Systems and software engineering — Systems and software assurance — Part 3: System integrity levels
ISO/IEC 15026-3:2011 specifies the concept of integrity levels with corresponding integrity level requirements that are required to be met in order to show the achievement of the integrity level. It places requirements on and recommends methods for defining and using integrity levels and their integrity level requirements, including the assignment of integrity levels to systems, software products…
Information technology - Security techniques - Signcryption
ISO/IEC 29150:2011 specifies four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs. The methods specified in ISO/IEC 29150:2011 have been designed to maximize the level of security and provide efficient processing of data. All the mechanisms defined have…
Information technology - Security techniques - Key management - Part 5: Group key management
ISO/IEC 11770-5:2011 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.
It defines the symmetric key based key establishment mechanisms for multiple entities with a key distribution centre (KDC), and defines symmetric key…