Software and systems engineering - Software testing - Part 13: Using the ISO/IEC/IEEE 29119 series i...
This document:
— gives information for software testers for the systematic, risk-based testing of biometric systems and larger systems which include biometric subsystems;
— establishes the importance of both biometric standards and software testing standards and provides overviews of both areas and their standardization;
— specifies the most important biometric standards for software…
Systems and software engineering — Life cycle management — Part 7000: Standard model process for add...
The standard establishes a set of processes by which engineers and technologists can include consideration of ethical values throughout the stages of concept exploration and development, which encompass system initiation, analysis, and design. This standard provides engineers and technologists with an implementable process aligning innovation management processes, system design approaches, and…
Information security, cybersecurity and privacy protection – Privacy enhancing data de-identificatio...
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller’s behalf,…
Systems and software engineering - Life cycle management - Part 7000: Standard model process for add...
The standard establishes a set of processes by which engineers and technologists can include consideration of ethical values throughout the stages of concept exploration and development, which encompass system initiation, analysis, and design. This standard provides engineers and technologists with an implementable process aligning innovation management processes, system design approaches, and…
Information security, cybersecurity and privacy protection – Privacy enhancing data de-identificatio...
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller’s behalf,…
Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organ...
This document provides guidelines for organizational privacy risk management, extended from ISO 31000:2018.
This document provides guidance to organizations for integrating risks related to the processing of personally identifiable information (PII) as part of an organizational privacy risk management programme. It distinguishes between the impact that processing PII can have on an individual…
Information security, cybersecurity and privacy protection - Application of ISO 31000:2018 for organ...
This document provides guidelines for organizational privacy risk management, extended from ISO 31000:2018.
This document provides guidance to organizations for integrating risks related to the processing of personally identifiable information (PII) as part of an organizational privacy risk management programme. It distinguishes between the impact that processing PII can have on an individual…
Health informatics — Principles and data requirements for consent in the collection, use or disclosu...
This document defines the set of frameworks of consent for the collection, use and/or disclosure of personal information by healthcare practitioners or organizations that are frequently used to obtain agreement to process the personal health information of subjects of care. This is in order to provide an informational consent framework which can be specified and used by individual policy domains…
Information security, cybersecurity and privacy protection — Security and privacy requirements for a...
This document provides high-level security and privacy requirements and recommendations for authentication using biometrics on mobile devices, including security and privacy requirements and recommendations for functional components and for communication.
This document is applicable to the cases that the biometric data and derived biometric data do not leave the device, i.e. local modes.
Information security, cybersecurity and privacy protection - Security and privacy requirements for a...
This document provides high-level security and privacy requirements and recommendations for authentication using biometrics on mobile devices, including security and privacy requirements and recommendations for functional components and for communication.
This document is applicable to the cases that the biometric data and derived biometric data do not leave the device, i.e. local modes.