Information technology - Security techniques - Vulnerability handling processes
This document provides requirements and recommendations for how to process and remediate reported potential vulnerabilities in a product or service.
This document is applicable to vendors involved in handling vulnerabilities.
Technologies de l'information - Techniques de sécurité - Processus de traitement de la vulnérab...
Le présent document fournit des exigences et des recommandations sur la manière de traiter et résoudre les vulnérabilités potentielles signalées dans un produit ou un service.
Le présent document s'applique aux fournisseurs impliqués dans le traitement des vulnérabilités.
Pressure regulators for use with medical gases — Part 2: Manifold and line pressure regulators
1 * Scope
This document specifies design, construction, type testing, and marking requirements for manifold pressure regulators (as defined in 3.7) and line pressure regulators (as defined in 3.5) intended for use in medical gas pipeline systems.
Examples of gases include oxygen, medical air and oxygen/nitrous oxide mixtures.
This document applies to manifold pressure regulators and line…
Détendeurs pour l’utilisation avec les gaz médicaux — Partie 2 : Détendeurs de rampes et de canalisa...
1 * Domaine d'application
Le présent document spécifie la conception, la construction, les essais de type et les exigences de marquage s’appliquant aux détendeurs de rampes (tels que définis en 3.7) et aux détendeurs de canalisations (tels que définis en 3.5), destinés aux réseaux de distribution de gaz médicaux.
De tels gaz sont par exemple l’oxygène, l’air médical et les mélanges d’…
Pressure regulators for use with medical gases — Part 3: Pressure regulators integrated with cylinde...
1 *Scope
This document specifies design, type testing, and marking requirements for cylinder valves with
integrated pressure regulators [as defined in 3.26 and referred to hereafter as valves with
integrated pressure regulators (VIPRs)] intended for the administration of medical gases in
the treatment, management, diagnostic evaluation and care of patients or for gases used for driving…
Détendeurs pour l’utilisation avec les gaz médicaux — Partie 3 : Détendeurs intégrés dans les robine...
1 *Domaine d’application
Le présent document spécifie la conception, les essais de type et les exigences de marquage s’appliquant
aux détendeurs intégrés dans les robinets de bouteilles [tels que définis en 3.26 et dénommés ci-après
détendeur intégré dans les robinets de bouteilles (VIPR)], destinés à l’administration de gaz
médicaux dans le cadre du traitement, de la gestion, de l’évaluation…
Systems and software engineering — Life cycle management — Part 2: Guidelines for the application of...
1 Scope
This document is a guideline for the application of ISO/IEC/IEEE 15288:2015. It addresses system,
life cycle, organizational, project, and process, concept application, principally through reference
to ISO/IEC/IEEE 24748-1 and ISO/IEC/IEEE 15288:2015. It gives guidance on applying ISO/IEC/
IEEE 15288:2015 from the aspects of strategy, planning, application in organizations, and…
Information technology — Framework for specifying a common access profile (CAP) of needs and capabil...
1 Scope
This International Standard defines a framework for specifying a common access profile (CAP) of needs and
capabilities of users, computing systems, and their environments, including access that is supported by
assistive technologies. It provides a basis for identifying and dealing with accessibility issues in a standardised
manner across multiple platforms. It can be used to evaluate…
Information technology — Electronic discovery — Part 2: Guidance for governance and management of el...
1 Scope
This document provides guidance for technical and non-technical personnel at senior management levels within an organization, including those with responsibility for compliance with statuary and regulatory requirements, and industry standards.
It describes how such personnel can identify and take ownership of risks related to electronic discovery, set policy and achieve compliance with…
Information technology — Security techniques — Identity proofing
1 Scope
This document:
— gives guidelines for the identity proofing of a person;
— specifies levels of identity proofing, and requirements to achieve these levels.
This document is applicable to identity management systems.