Information technology — Object Management Group Automated Function Points (AFP), 1.0
1.1 Purpose This International Standard defines a method for automating the counting of Function Points that is generally consistent with the Function Point Counting Practices Manual, Release 4.3.1 (IFPUG CPM) produced by the International Function Point Users Group (IFPUG). Guidelines in this International Standard may differ from those in the IFPUG CPM at points where subjective judgments…
Road vehicles — Extended vehicle (ExVe) web services — Part 3: Security
This document defines how to authenticate users and Accessing Parties on a web services interface. It also defines how a Resource Owner can delegate Access to its Resources to an Accessing Party. Within this context, this document also defines the necessary roles and required separation of duties between these in order to fulfil requirements stated on security, data privacy and data protection.…
Road vehicles - Vehicle to grid communication interface - Part 1: General information and use case d...
ISO 15118-1:2019 This document, as a basis for the other parts of the ISO 15118 series, specifies terms and definitions, general requirements and use cases for conductive and wireless HLC between the EVCC and the SECC.
This document is applicable to HLC involved in conductive and wireless power transfer technologies in the context of manual or automatic connection devices.
This document is also…
Road vehicles — Vehicle to grid communication interface — Part 1: General information and use-case d...
This document, as a basis for the other parts of the ISO 15118 series, specifies terms and definitions, general requirements and use cases for conductive and wireless HLC between the EVCC and the SECC.
This document is applicable to HLC involved in conductive and wireless power transfer technologies in the context of manual or automatic connection devices.
This document is also applicable to…
Information technology — Security techniques — Code of practice for protection of personally identif...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, this document specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the…
Information technology - Security techniques - Code of practice for protection of personally identif...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, this document specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the…
Information technology — Security techniques — Privacy architecture framework
1 Scope
This International Standard defines a privacy architecture framework that:
— specifies concerns for ICT systems that process PII;
— lists components for the implementation of such systems; and
— provides architectural views contextualizing these components.
This International Standard is applicable to entities involved in specifying, procuring, architecting, designing,
testing,…
Information technology — Security techniques — Privacy capability assessment model
1 Scope
This International Standard provides organizations with high-level guidance about how to assess their
capability to manage privacy-related processes.
In particular, it
— specifies steps in assessing processes to determine privacy capability,
— specifies a set of levels for privacy capability assessment,
— provides guidance on the key process areas against which privacy capability…
Information technology - Security techniques - Privacy architecture framework
This document defines a privacy architecture framework that:
— specifies concerns for ICT systems that process PII;
— lists components for the implementation of such systems; and
— provides architectural views contextualizing these components.
This document is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining,…
Information technology — Security techniques — Privacy architecture framework
This document defines a privacy architecture framework that:
— specifies concerns for ICT systems that process PII;
— lists components for the implementation of such systems; and
— provides architectural views contextualizing these components.
This document is applicable to entities involved in specifying, procuring, architecting, designing, testing, maintaining,…