Information technology — Business operational view — Part 12: Privacy protection requirements (PPR) ...
This document:
— provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in business operational view (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and…
Information technology - Business operational view - Part 12: Privacy protection requirements (PPR) ...
This document:
— provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in business operational view (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and…
Information security, cybersecurity and privacy protection — General principles, requirements and gu...
This document specifies general principles, requirements and guidance for a security evaluation of a biometric system.
This document provides an overview of the main biometric-specific aspects, i.e. recognition performance, presentation attack detection and privacy, and specifies principles to consider for the security evaluation of a biometric system.
This document does not address the non-…
Information security, cybersecurity and privacy protection - General principles, requirements and gu...
This document specifies general principles, requirements and guidance for a security evaluation of a biometric system.
This document provides an overview of the main biometric-specific aspects, i.e. recognition performance, presentation attack detection and privacy, and specifies principles to consider for the security evaluation of a biometric system.
This document does not address the non-…
Information security, cybersecurity and privacy protection - Testing cryptographic modules in their ...
This document provides recommendations, requirements and checklists which can be used to support the specification and field testing of cryptographic modules in their field within an organization’s security system. The cryptographic modules have an overall security rating commensurate with the four security levels defined in ISO/IEC 19790:2025, to provide for:
— a wide spectrum of data…
Information security, cybersecurity and privacy protection — Testing cryptographic modules in their ...
This document provides recommendations, requirements and checklists which can be used to support the specification and field testing of cryptographic modules in their field within an organization’s security system. The cryptographic modules have an overall security rating commensurate with the four security levels defined in ISO/IEC 19790:2025, to provide for:
— a wide spectrum of data…
Information technology — Genomic information representation — Part 3: Metadata and application progr...
This document specifies information metadata, metrics metadata, clinical data linkage metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces of genomic information. It defines:
— metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 (in Clause 6);
— metrics metadata containing sequencing data…
Information technology - Genomic information representation - Part 3: Metadata and application progr...
This document specifies information metadata, metrics metadata, clinical data linkage metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces of genomic information. It defines:
— metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 (in Clause 6);
— metrics metadata containing sequencing data…
Data governance – Part 11: Delivery of community and human services
Scope
This document specifies minimum requirements for the responsible and privacy-preserving collection, access, use, sharing and storage of personal information by organisations delivering community and human services. This Standard serves as a guide to help nonprofit organisations and funders engage with their data in ethical and equitable ways and to advance the culture of data collection,…
Scope
The Urban Dataset Metadata Requirements (UDMR) standard specifies a stratified set of dataset metadata. The following are within the scope of the standard:
- Descriptions of what the dataset is about, supplemented with temporal and geospatial information.
- Methods of accessing the dataset.
- Content and versioning information, simple FAIR (Findable, Accessible, Interoperable, Reusable…