Information technology — Common Biometric Exchange Formats Framework — Part 1: Data element specific...
ISO/IEC 19785-1:2015 defines structures and data elements for biometric information records (BIRs).
ISO/IEC 19785-1:2015 defines the concept of a domain of use to establish the applicability of a standard or specification that complies with CBEFF requirements.
ISO/IEC 19785-1:2015 defines the concept of a CBEFF patron format, which is a published BIR format specification that complies with CBEFF…
Information technology - Common Biometric Exchange Formats Framework - Part 1: Data element specific...
ISO/IEC 19785-1:2015 defines structures and data elements for biometric information records (BIRs).
ISO/IEC 19785-1:2015 defines the concept of a domain of use to establish the applicability of a standard or specification that complies with CBEFF requirements.
ISO/IEC 19785-1:2015 defines the concept of a CBEFF patron format, which is a published BIR format specification that complies with CBEFF…
Information technology — Security techniques — Privacy capability assessment model
ISO 29190:2015 provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.
In particular, it
- specifies steps in assessing processes to determine privacy capability,
- specifies a set of levels for privacy capability assessment,
- provides guidance on the key process areas against which privacy capability can be…
Information technology - Security techniques - Privacy capability assessment model
ISO 29190:2015 provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes.
In particular, it
- specifies steps in assessing processes to determine privacy capability,
- specifies a set of levels for privacy capability assessment,
- provides guidance on the key process areas against which privacy capability can be…
Information technology for learning, education and training — A reference framework of e-Portfolio i...
ISO/IEC/TS 20013:2015 details a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and development.
The reference framework identifies content and functional components that…
Information technology for learning, education and training - A reference framework of e-Portfolio i...
ISO/IEC/TS 20013:2015 details a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and development.
The reference framework identifies content and functional components that…
Intelligent transport systems — Vehicle interface for provisioning and support of ITS services — Par...
ISO 13185-2:2015 specifies the requirements of an ASN.1-based protocol between a vehicle-ITS-Station Gateway (V-ITS-SG) and a nomadic and/or mobile device (ND) to easily exchange vehicle information data.
The ASN.1-based protocol has been specified to support a wired or wireless connection between the ND and V-ITS-SG.
The Unified Gateway Protocol (UGP) is used between the V-ITS-SG and the ND. UGP…
Information technology — Business Operational View — Part 8: Identification of privacy protection re...
This part of ISO/IEC 15944:
? provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the
additional requirements in Business Operational View (BOV) specifications for identifying the additional
external constraints to be applied to recorded information in business transactions relating to personal
information of an individual, as required by legal and…
Information technology — Business Operational View — Part 5: Identification and referencing of requi...
1.1 Statement of scope
The modelling of a business transaction through scenarios and scenario components is done by specifying
the applicable constraints through explicitly stated rules. The Open-edi Reference Model identified two basic
classes of constraints, namely “internal constraints” and “external constraints” (see further Annex G).
ISO/IEC 15944-4 focuses on internal constraints with a…
Information and documentation — RFID in libraries — Part 4: Encoding of data elements based on rules...
ISO/TS 28560-4:2014 defines rules for ISO 28560‑1 data elements to be encoded in radio frequency identification (RFID) tags with a memory structure that is partitioned into four memory banks. This primarily applies to ISO/IEC 18000‑63 (previously known as ISO/IEC 18000‑6 Type C) operating in the UHF frequency, but not necessarily restricted to this technology.
The rules for encoding a subset of…