Health software and health IT systems safety, effectiveness and security - Part 1: Principles and co...
This document provides the principles, concepts, terms and definitions for health software and health IT systems, key properties of safety, effectiveness and security, across the full life cycle, from concept to decommissioning, as represented in Figure 1. It also identifies the transition points in the life cycle where transfers of responsibility occur, and the types of multi-lateral…
Health software and health IT systems safety, effectiveness and security — Part 1: Principles and co...
This document provides the principles, concepts, terms and definitions for health software and health IT systems, key properties of safety, effectiveness and security, across the full life cycle, from concept to decommissioning, as represented in Figure 1. It also identifies the transition points in the life cycle where transfers of responsibility occur, and the types of multi-lateral…
Information technology - Specification of DRM technology for digital publications - Part 3: Device k...
This document defines a technical solution for encrypting resources of EPUB publications, effectively registering a device certificate to providers and securely delivering decryption keys to reading systems included in licenses tailored to specific devices. This technical solution uses the passphrase-based authentication method defined in ISO/IEC TS 23078-2 for reading systems to receive the…
Information technology — Specification of DRM technology for digital publications — Part 3: Device k...
This document defines a technical solution for encrypting resources of EPUB publications, effectively registering a device certificate to providers and securely delivering decryption keys to reading systems included in licenses tailored to specific devices. This technical solution uses the passphrase-based authentication method defined in ISO/IEC TS 23078-2 for reading systems to receive the…
Health informatics — Public key infrastructure — Part 3: Policy management of certification authorit...
This document gives guidelines for certificate management issues involved in deploying digital certificates in healthcare. It specifies a structure and minimum requirements for certificate policies, as well as a structure for associated certification practice statements.
This document also identifies the principles needed in a healthcare security policy for cross-border communication and defines…
Health informatics — Public key infrastructure — Part 1: Overview of digital certificate services
This document defines the basic concepts underlying the use of digital certificates in healthcare and provides a scheme of interoperability requirements to establish a digital certificate-enabled secure communication of health information. It also identifies the major stakeholders who are communicating health-related information, as well as the main security services required for health…
Women's entrepreneurship — Key definitions and general criteria
This document establishes a set of common definitions related to women's entrepreneurship, such as those for women-owned business and women-led business. This document also defines women-led cooperatives and women-led informal enterprises. These definitions can be used, for example, in women's economic empowerment programmes (such as procurement and trade programmes) and for the…
Electric motor-operated hand-held tools, transportable tools and lawn and garden machinery - Safety ...
IEC 62841-3-1:2014+A1:2021 applies to transportable table saws with:
- a toothed single blade; or
- stacked blades that cut a single groove or slot; or
- a moulding head cutter intended for cutting wood and analogous materials, plastics and nonferrous metals except magnesium with a saw blade diameter between 105 mm and 315 mm, which hereinafter may simply be referred to as saw or tool. The…
Personal identification — ISO-compliant driving licence — Part 2: Machine-readable technologies
1 Scope
The purpose of storing IDL data on machine-readable media on the IDL is to:
— increase productivity (of data and IDL use),
— facilitate electronic data exchange, and
— assist in authenticity and integrity validation.
This document thus specifies the following:
— mandatory and optional machine-readable data;
— the logical data structure;
— encoding rules for the machine-readable…
Telecommunications and exchange between information technology systems — Requirements for local and ...
Scope
The scope of this standard is to specify provision of connectionless user data confidentiality, frame data
integrity, and data origin authenticity by media access independent protocols and entities that operate
transparently to MAC Clients.
NOTE—The MAC Clients are as specified in IEEE Std 802®, IEEE Std 802.1Q™, and IEEE Std 802.1X.2
To this end, it
a) Specifies the requirements to…