Acoustics — Measurement of speech level reduction of furniture ensembles and enclosures — Part 1: La...
This document specifies a laboratory method to facilitate the comparison of furniture ensembles and enclosures with respect to their ability to reduce the speech level of the occupant speaking inside the product.
In this method, the sound power level is measured in two scenarios: 1) without the product, and 2) with the product. During scenario 1), the test signal is produced by the sound source…
Personal identification — ISO-compliant driving licence — Part 2: Machine-readable technologies
The purpose of storing IDL data on machine-readable media on the IDL is to:
— increase productivity (of data and IDL use),
— facilitate electronic data exchange, and
— assist in authenticity and integrity validation.
This document thus specifies the following:
— mandatory and optional machine-readable data;
— the logical data structure;
— encoding rules for the machine-…
Personal identification - ISO-compliant driving licence - Part 2: Machine-readable technologies
The purpose of storing IDL data on machine-readable media on the IDL is to:
— increase productivity (of data and IDL use),
— facilitate electronic data exchange, and
— assist in authenticity and integrity validation.
This document thus specifies the following:
— mandatory and optional machine-readable data;
— the logical data structure;
— encoding rules for the machine-…
Information technology — Online privacy notices and consent
This document specifies controls which shape the content and the structure of online privacy notices as well as the process of asking for consent to collect and process personally identifiable information (PII) from PII principals.
This document is applicable in any online context where a PII controller or any other entity processing PII informs PII principals of processing.
Information technology - Online privacy notices and consent
This document specifies controls which shape the content and the structure of online privacy notices as well as the process of asking for consent to collect and process personally identifiable information (PII) from PII principals.
This document is applicable in any online context where a PII controller or any other entity processing PII informs PII principals of processing.
Information technology — Artificial intelligence — Overview of trustworthiness in artificial intelli...
This document surveys topics related to trustworthiness in AI systems, including the following:
— approaches to establish trust in AI systems through transparency, explainability, controllability, etc.;
— engineering pitfalls and typical associated threats and risks to AI systems, along with possible mitigation techniques and methods; and
— approaches to assess and achieve…
Information technology - Artificial intelligence - Overview of trustworthiness in artificial intelli...
This document surveys topics related to trustworthiness in AI systems, including the following:
— approaches to establish trust in AI systems through transparency, explainability, controllability, etc.;
— engineering pitfalls and typical associated threats and risks to AI systems, along with possible mitigation techniques and methods; and
— approaches to assess and achieve…
Information technology — Business operational view — Part 12: Privacy protection requirements (PPR) ...
This document:
— provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in business operational view (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and…
Information technology - Business operational view - Part 12: Privacy protection requirements (PPR) ...
This document:
— provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in business operational view (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and…
Blockchain and distributed ledger technologies — Privacy and personally identifiable information pro...
This document provides an overview of privacy and personally identifiable information (PII) protection as applied to blockchain and distributed ledger technologies (DLT) systems.