Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 111 - 120 de 239
Information technology — Security techniques — Testing cryptographic modules in their operational en...
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization's security system. The cryptographic modules have four security levels which ISO/IEC 19790 defines to provide for a wide spectrum of data sensitivity (e.g. low-value administrative data,…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2018-05-17
Code(s) de l'ICS :
35.030
Information technology - Security techniques - Testing cryptographic modules in their operational en...
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization's security system. The cryptographic modules have four security levels which ISO/IEC 19790 defines to provide for a wide spectrum of data sensitivity (e.g. low-value administrative data,…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2018-05-17
Code(s) de l'ICS :
35.030
Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 385...
This document provides guidance to the members of governing bodies of organizations and their executive managers on the implications of ISO/IEC 38505-1 for data management. It assumes understanding of the principles of ISO/IEC 38500 and familiarization with the data accountability map and associated matrix of considerations, as presented in ISO/IEC 38505-1. This document enables an informed…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2018-05-15
Code(s) de l'ICS :
35.020
Information technology - Governance of IT - Governance of data - Part 2: Implications of ISO/IEC 385...
This document provides guidance to the members of governing bodies of organizations and their executive managers on the implications of ISO/IEC 38505-1 for data management. It assumes understanding of the principles of ISO/IEC 38500 and familiarization with the data accountability map and associated matrix of considerations, as presented in ISO/IEC 38505-1. This document enables an informed…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2018-05-15
Code(s) de l'ICS :
35.020
Power systems management and associated information exchange - Interoperability in the long term - P...
IEC TS 62361-102:2018(E) outlines a technical approach for achieving effective information exchange between power system installations governed by IEC 61850 and business systems integrated with IEC CIM standard data exchanges, based on a selected specific set of use cases, but also with the goal of creating a framework that will extend successfully to other use cases in the future. This document…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2018-03-18
Code(s) de l'ICS :
33.200
Information technology — Metamodel framework for interoperability (MFI) — Part 13: Metamodel for for...
1 Scope The primary purpose of the ISO/IEC 19763 series is to specify a metamodel framework for interoperability. This document specifies a metamodel for registering form designs. This document provides a metamodel to describe the structure and semantics of an implemented form devoid of any specific, domain semantics, e.g. in healthcare, social science, e-government and e-business, or…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2017-12-31
Code(s) de l'ICS :
35.040.50
Information technology — Security techniques — Guidelines for privacy impact assessment
This document gives guidelines for —    a process on privacy impact assessments, and —    a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations. This document is relevant to those involved in designing or implementing projects, including the parties…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2017-06-27
Code(s) de l'ICS :
35.030
Information technology - Security techniques - Guidelines for privacy impact assessment
This document gives guidelines for — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations. This document is relevant to those involved in designing or implementing projects, including the parties…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2017-06-27
Code(s) de l'ICS :
35.030
Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 3850...
ISO/IEC 38505-1:2017 provides guiding principles for members of governing bodies of organizations (which can comprise owners, directors, partners, executive managers, or similar) on the effective, efficient, and acceptable use of data within their organizations by - applying the governance principles and model of ISO/IEC 38500 to the governance of data, - assuring stakeholders that, if…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2017-03-30
Code(s) de l'ICS :
35.020
Information technology - Governance of IT - Governance of data - Part 1: Application of ISO/IEC 3850...
ISO/IEC 38505-1:2017 provides guiding principles for members of governing bodies of organizations (which can comprise owners, directors, partners, executive managers, or similar) on the effective, efficient, and acceptable use of data within their organizations by - applying the governance principles and model of ISO/IEC 38500 to the governance of data, - assuring stakeholders that, if…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2017-03-30
Code(s) de l'ICS :
35.020

Spacer