Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information managemen...
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.
This document specifies PIMS-related requirements and provides guidance for PII controllers and…
Information technology - Multimedia application format (MPEG-A) - Part 21: Visual identity managemen...
This document specifies the standard representation of the set of signalling and data used in the process of preserving privacy for storage sharing image/video.
Information technology — Multimedia application format (MPEG-A) — Part 21: Visual identity managemen...
This document specifies the standard representation of the set of signalling and data used in the process of preserving privacy for storage sharing image/video.
1 Scope
This document aims to normalize privacy-enhancing protocols and services by
— using the mechanisms from parts of ISO/IEC 7816 and parts of ISO/IEC 18328 that contribute to security and privacy,
— providing discoverability means of privacy-enabling attributes,
— defining requirements for attribute-based credential handling, and
— identifying data objects and commands for ICCs.…
Information technology - Use of biometrics in video surveillance systems - Part 1: System design and...
The ISO 30137 series is applicable to the use of biometrics in VSS (also known as Closed Circuit Television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities such as gait recognition…
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and...
The ISO 30137 series is applicable to the use of biometrics in VSS (also known as Closed Circuit Television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities such as gait recognition…
IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts
This document defines terms for identity management, and specifies core concepts of identity and identity management and their relationships.
It is applicable to any information system that processes identity information.
IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts
This document defines terms for identity management, and specifies core concepts of identity and identity management and their relationships.
It is applicable to any information system that processes identity information.
Health informatics — Workforce roles and capabilities for terminology and terminology services in he...
This document specifies the tasks, roles, and key skills, requirements and competencies for personnel involved in terminology services in healthcare organizations.
This document specifies
— terminology services in healthcare organizations including the selection, authoring, and deployment and use of terminology subsets and maps; developing and managing terminology management processes…
Information technology - Object Management Group Automated Function Points (AFP), 1.0
1.1 Purpose This International Standard defines a method for automating the counting of Function Points that is generally consistent with the Function Point Counting Practices Manual, Release 4.3.1 (IFPUG CPM) produced by the International Function Point Users Group (IFPUG). Guidelines in this International Standard may differ from those in the IFPUG CPM at points where subjective judgments…