Information technology for learning, education and training — Nomadicity and mobile technologies
1 Scope
This document provides a learner information model specific to mobile learning to enable learning, education and training environments to reflect the specific needs of mobile participants.
This document provides:
— definitions of mobile technology and mobile learning appropriate for all sectors in learning, education and training;
— a description of the learner information model for…
Information security, cybersecurity and privacy protection — Governance of information security
1 Scope
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes within the organization.
The intended audience for this document is:
— governing body and top management;
— those who are responsible for evaluating, directing…
Information technology — Learning, education, and training — Metadata for facilitators of online lea...
This document specifies a metadata structure to store, present and exchange online learning facilitator (OLF) information by specifying the data elements and their attributes to describe facilitator’s information on various kinds of online education platforms.
This document provides a generic information model of OLF to describe relevant information that applies to the facilitation and training…
Information technology - Learning, education, and training - Metadata for facilitators of online lea...
This document specifies a metadata structure to store, present and exchange online learning facilitator (OLF) information by specifying the data elements and their attributes to describe facilitator’s information on various kinds of online education platforms.
This document provides a generic information model of OLF to describe relevant information that applies to the facilitation and training…
Health informatics — Cloud computing considerations for the security and privacy of health informati...
This document provides an overview of security and privacy considerations for Electronic Health Records (EHR) in a cloud computing service that users can leverage when selecting a service provider.
Health software and health IT systems safety, effectiveness and security - Part 1: Principles and co...
This document provides the principles, concepts, terms and definitions for health software and health IT systems, key properties of safety, effectiveness and security, across the full life cycle, from concept to decommissioning, as represented in Figure 1. It also identifies the transition points in the life cycle where transfers of responsibility occur, and the types of multi-lateral…
Health software and health IT systems safety, effectiveness and security — Part 1: Principles and co...
This document provides the principles, concepts, terms and definitions for health software and health IT systems, key properties of safety, effectiveness and security, across the full life cycle, from concept to decommissioning, as represented in Figure 1. It also identifies the transition points in the life cycle where transfers of responsibility occur, and the types of multi-lateral…
Personal identification — ISO-compliant driving licence — Part 2: Machine-readable technologies
1 Scope
The purpose of storing IDL data on machine-readable media on the IDL is to:
— increase productivity (of data and IDL use),
— facilitate electronic data exchange, and
— assist in authenticity and integrity validation.
This document thus specifies the following:
— mandatory and optional machine-readable data;
— the logical data structure;
— encoding rules for the machine-readable…
Information technology — Common Biometric Exchange Formats Framework — Part 1: Data element specific...
1 Scope
This document defines:
— structures and data elements for biometric information records (BIRs);
— the concept of a domain of use to establish the applicability of a standard or specification that conforms with CBEFF requirements;
— the concept of a CBEFF patron format, which is a published BIR format specification that complies with CBEFF requirements, specified by a CBEFF patron;
—…
Information technology — Business operational view — Part 12: Privacy protection requirements (PPR) ...
1 Scope
This document:
— provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in business operational view (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and…