Information security, cybersecurity and privacy protection - Requirements for the competence of IT s...
This document complements and supplements the procedures and general requirements found in ISO/IEC 17025:2017 for laboratories performing evaluations based on the ISO/IEC 15408 series and ISO/IEC 18045.
Information security, cybersecurity and privacy protection — Requirements for the competence of IT s...
This document complements and supplements the procedures and general requirements found in ISO/IEC 17025:2017 for laboratories performing testing based on ISO/IEC 19790 and ISO/IEC 24759.
Information security, cybersecurity and privacy protection — Requirements for the competence of IT s...
This document complements and supplements the procedures and general requirements found in ISO/IEC 17025:2017 for laboratories performing evaluations based on the ISO/IEC 15408 series and ISO/IEC 18045.
Information security, cybersecurity and privacy protection — Guidelines on personally identifiable i...
This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying:
— a harmonized terminology for PII deletion;
— an approach for defining deletion rules in an efficient way;
— a description of required documentation;
— a broad definition of roles, responsibilities and…
Information security, cybersecurity and privacy protection - Guidelines on personally identifiable i...
This document contains guidelines for developing and establishing policies and procedures for deletion of personally identifiable information (PII) in organizations by specifying:
— a harmonized terminology for PII deletion;
— an approach for defining deletion rules in an efficient way;
— a description of required documentation;
— a broad definition of roles, responsibilities and…
Information technology for learning, education and training — Reference framework of e-Portfolio inf...
1 Scope
This document specifies a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and personal development.
The reference framework identifies content and functional…
Information technology — Big data reference architecture — Part 4: Security and privacy
1 Scope
This document specifies the security and privacy aspects applicable to the big data reference architecture (BDRA) including the big data roles, activities and functional components and also provides guidance on security and privacy operations for big data.
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part ...
1 Scope
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF.
Amongst PUF use…