Information security, cybersecurity and privacy protection - Hardware monitoring technology for hard...
This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target entity, objective pattern, and method of deployment. Moreover, this document summarizes the possible ways of utilizing monitoring technologies for hardware security…
Privacy - Part 2: Canadian Information Privacy Protection Framework
Scope
This standard specifies minimum requirements for organizations that access, collect, use, retain, and disclose personal information, and offers any benefit or consideration regardless of monetary exchange for such benefit or consideration.
The standard aims to provide a baseline framework for organizations seeking to harmonize conformance to the various provincial/territorial, federal,…
Information security, cybersecurity and privacy protection — Information security controls based on ...
This document provides guidelines supporting the implementation of information security controls in telecommunications organizations.
The adoption of this document will allow telecommunications organizations to meet baseline information security management requirements of confidentiality, integrity, availability and any other relevant information security property.
Information security, cybersecurity and privacy protection - Information security controls based on ...
This document provides guidelines supporting the implementation of information security controls in telecommunications organizations.
The adoption of this document will allow telecommunications organizations to meet baseline information security management requirements of confidentiality, integrity, availability and any other relevant information security property.
Information security, cybersecurity and privacy protection — Privacy operationalisation model and me...
This guidance document describes a model and method to operationalize the privacy principles specified in ISO/IEC 29100 into sets of controls and functional capabilities. The method is described as a process that builds upon ISO/IEC/IEEE 24774.
This document is designed for use in conjunction with relevant privacy and security standards and guidance which impact privacy operationalization. It…
Information security, cybersecurity and privacy protection - Privacy operationalisation model and me...
This guidance document describes a model and method to operationalize the privacy principles specified in ISO/IEC 29100 into sets of controls and functional capabilities. The method is described as a process that builds upon ISO/IEC/IEEE 24774.
This document is designed for use in conjunction with relevant privacy and security standards and guidance which impact privacy operationalization. It…
Information technology — City service platform for public health emergencies — Part 1: Overview and ...
This document specifies the general requirements for a city service platform for public health emergencies. It also specifies the requirements in terms of data, functions, security and privacy protection.
Information technology - City service platform for public health emergencies - Part 1: Overview and ...
This document specifies the general requirements for a city service platform for public health emergencies. It also specifies the requirements in terms of data, functions, security and privacy protection.
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and...
The ISO/IEC 30137 series is applicable to the use of biometrics in VSSs (also known as closed circuit television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post-event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities, such as gait…
Information technology - Use of biometrics in video surveillance systems - Part 1: System design and...
The ISO/IEC 30137 series is applicable to the use of biometrics in VSSs (also known as closed circuit television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post-event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities, such as gait…