Technologies de l’information — Techniques de sécurité — Principes et processus d’investigation sur ...
1 Domaine d’application
La présente Norme internationale fournit des lignes directrices concernant des modèles idéalisés pour des processus d’investigation des incidents communs à travers divers scénarios d’investigation sur incident impliquant des preuves numériques. Cela inclut des processus allant de la préparation antérieure à l’incident à la clôture de l’investigation, ainsi que tout…
Information technology — Security techniques — Electronic discovery — Part 3: Code of practice for e...
1 Scope
This document provides requirements and guidance on activities in electronic discovery, including, but not limited to, identification, preservation, collection, processing, review, analysis and production of electronically stored information (ESI). In addition, this document specifies relevant measures that span the lifecycle of the ESI from its initial creation through to final…
Information technology — Telecommunications cabling requirements for remote powering of terminal equ...
1 Scope
This document
a) addresses the support of safety extra low voltage (SELV) and limited power source (LPS)
applications that provide remote power over balanced cabling in accordance with the
reference implementations of ISO/IEC 11801 series standards using currents per
conductor of up to 500 mA and targets the support of applications that provide remote
power over balanced cabling to…
Information technology — Security techniques — Code of practice for personally identifiable informat...
1 Scope
This Recommendation | International Standard establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).
In particular, this Recommendation | International Standard specifies guidelines based on ISO/IEC 27002, taking into…
Information technology — User interfaces — Voice commands — Part 2: Constructing and testing
1 Scope
This document provides the technical criterions and test methods of voice commands and its speech recognition engine.
The technical criterions include the phonetic requirements for spoken words or phrases that compose the voice command.
The test methods verify whether the voice command or speech recognition engine satisfies the required specifications.
Information technology — User interfaces — Voice commands — Part 3: Translation and localization
1 Scope
This document contains requirements and recommendations concerning multilingual voice commands and internationalization.
This document specifies the linguistic requirements and recommendations for translation and localization of spoken words or phrases for voice commands.
This document also includes how to determine the correct words or phrases for voice commands based on the various…
Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 3850...
1 Scope
This document provides guiding principles for members of governing bodies of organizations (which can comprise owners, directors, partners, executive managers, or similar) on the effective, efficient, and acceptable use of data within their organizations by
— applying the governance principles and model of ISO/IEC 38500 to the governance of data,
— assuring stakeholders that, if the…
Information technology — Security techniques — Governance of information security
1 Scope
This Recommendation | International Standard provides guidance on concepts and principles for the governance of information security, by which organisations can evaluate, direct, monitor and communicate the information security related activities within the organisation.
This International Standard is applicable to all types and sizes of organisations
Information technology — Security techniques — Competence requirements for information security mana...
1 Scope
This document specifies the requirements of competence for ISMS professionals leading or involved in establishing, implementing, maintaining and continually improving one or more information security management system processes that conforms to ISO/IEC 27001.