Information technology - Common Biometric Exchange Formats Framework - Part 1: Data element specific...
This document defines:
— structures and data elements for biometric information records (BIRs);
— the concept of a domain of use to establish the applicability of a standard or specification that conforms with CBEFF requirements;
— the concept of a CBEFF patron format, which is a published BIR format specification that complies with CBEFF requirements, specified by a CBEFF patron…
Information technology — Multimedia application format (MPEG-A) — Part 21: Visual identity managemen...
1 Scope
This document specifies the standard representation of the set of signalling and data used in the process of preserving privacy for storage sharing image/video.
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts
1 Scope
This document defines terms for identity management, and specifies core concepts of identity and
identity management and their relationships.
It is applicable to any information system that processes identity information.
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and...
1 Scope
The ISO 30137 series is applicable to the use of biometrics in VSS (also known as Closed Circuit Television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities such as gait…
Information technology — Security techniques — Privacy engineering for system life cycle processes
1 Scope
This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes:
— the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management); and
— privacy engineering activities in key engineering…
Information technology for learning, education and training — Learning analytics interoperability — ...
1 Scope
This document specifies privacy and data protection requirements and attributes to inform design of learning analytics systems and learning analytics practices in schools, universities, workplace learning and blended learning settings.
Acoustics — Measurement of speech level reduction of furniture ensembles and enclosures — Part 1: La...
This document specifies a laboratory method to facilitate the comparison of furniture ensembles and enclosures with respect to their ability to reduce the speech level of the occupant speaking inside the product.
In this method, the sound power level is measured in two scenarios: 1) without the product, and 2) with the product. During scenario 1), the test signal is produced by the sound source…
Personal identification — ISO-compliant driving licence — Part 2: Machine-readable technologies
The purpose of storing IDL data on machine-readable media on the IDL is to:
— increase productivity (of data and IDL use),
— facilitate electronic data exchange, and
— assist in authenticity and integrity validation.
This document thus specifies the following:
— mandatory and optional machine-readable data;
— the logical data structure;
— encoding rules for the machine-…
Personal identification - ISO-compliant driving licence - Part 2: Machine-readable technologies
The purpose of storing IDL data on machine-readable media on the IDL is to:
— increase productivity (of data and IDL use),
— facilitate electronic data exchange, and
— assist in authenticity and integrity validation.
This document thus specifies the following:
— mandatory and optional machine-readable data;
— the logical data structure;
— encoding rules for the machine-…
Information technology — Online privacy notices and consent
This document specifies controls which shape the content and the structure of online privacy notices as well as the process of asking for consent to collect and process personally identifiable information (PII) from PII principals.
This document is applicable in any online context where a PII controller or any other entity processing PII informs PII principals of processing.