This document specifies requirements for using an RFID tag to individually identify a tyre.
Three RFID tyre tag technologies are considered in this document: embedded, patch, sticker.
Tyre tags can be used for all tyre categories.
Information technology —Real-time locating system (RTLS) device performance test methods — Part 5: T...
This document defines the test methods for determining the performance characteristics of chirp spread spectrum (CSS) real time locating system (RTLS) equipment including tags and readers which are applicable to the selection of equipment that conforms to ISO/IEC 24730‑5 for specific applications. This document does not apply to the testing in relation to regulatory or similar requirements.
The…
Information technology — Coding-independent code points — Part 4: Usage of video signal type code po...
This document describes common industry representation practices for the usage of video signal type code points, as these properties are conveyed across video content production and distribution carriage systems.
Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information managemen...
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.
This document specifies PIMS-related requirements and provides guidance for PII controllers and…
Techniques de sécurité — Extension d'ISO/IEC 27001 et ISO/IEC 27002 au management de la protect...
Le présent document spécifie les exigences et fournit des recommandations pour la création, la mise en œuvre, le maintien et l'amélioration continue d'un système de management de la protection de la vie privée (PIMS) sous la forme d'une extension de l'ISO/IEC 27001 et l'ISO/IEC 27002 pour le management de la protection de la vie privée dans le contexte de l'…
Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information managemen...
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.
This document specifies PIMS-related requirements and provides guidance for PII controllers and…
Information technology - Coding-independent code points - Part 4: Usage of video signal type code po...
This document describes common industry representation practices for the usage of video signal type code points, as these properties are conveyed across video content production and distribution carriage systems.
Techniques de sécurité - Extension d'ISO/IEC 27001 et ISO/IEC 27002 au management de la protect...
Le présent document spécifie les exigences et fournit des recommandations pour la création, la mise en œuvre, le maintien et l'amélioration continue d'un système de management de la protection de la vie privée (PIMS) sous la forme d'une extension de l'ISO/IEC 27001 et l'ISO/IEC 27002 pour le management de la protection de la vie privée dans le contexte de l'…
Intelligent transport systems — Evolved-universal terrestrial radio access network — Part 3: LTE-V2X
This document provides specifications related to the ITS-S access layer for a communication interface (CI) named "ITS-LTE-V2X".
ITS-LTE-V2X CIs are based on the evolved-universal terrestrial radio access (E-UTRA) vehicle-to- everything (LTE-V2X) technology standardized at 3GPP.
This document enables usage of the LTE-V2X technology as an ITS access technology in an ITS station by…