Information and documentation — RFID in libraries — Part 1: Data elements and general guidelines for...
ISO 28560-1:2014 specifies a model for the use of radio frequency identification (RFID) tags for items appropriate for the needs of all types of libraries, including academic, public, corporate, special, and school.
ISO 28560-1:2014 provides the framework to ensure interoperability between libraries that exchange library items with RFID tags, the freedom of the library to acquire or renew…
Information technology — Security techniques — Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Information technology - Security techniques - Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Intelligent transport systems — Cooperative systems — Roles and responsibilities in the context of c...
ISO/TS 17427:2014 describes the (actor invariant) roles and responsibilities required to deploy and operate Cooperative-ITS (C-ITS). The organizational architecture described in this document is to be used for a fully operational system. ISO/TS 17427:2014 is couched in terms of an organizational or enterprise viewpoint, as defined in ISO/IEC 10746 Open Distributed Processing.
ISO/TS 17427:2014…
Information technology — Radio frequency identification for item management — Implementation guideli...
Scope
This Technical Report provides guidance to systems designers to help them determine potential threats to
data security of the tag and tag-to-reader communication in an RFID system, and appropriate
countermeasures to provide data security (identified as 1 through 2 in Figure 1). Although important, it is
beyond the scope of this Technical Report to address security aspects of the reader-to-…
Health informatics — Security and privacy requirements of EHR systems for use in conformity assessme...
ISO/TS 14441:2013 examines electronic patient record systems at the clinical point of care that are also interoperable with EHRs. ISO/TS 14441:2013 addresses their security and privacy protections by providing a set of security and privacy requirements, along with guidelines and best practice for conformity assessment.
ISO/TS 14441:2013 includes a cross-mapping of 82 security and privacy…
Information technology — Security techniques — Privacy architecture framework
ISO/IEC 29101:2013 defines a privacy architecture framework that
specifies concerns for information and communication technology (ICT) systems that process personally identifiable information (PII);
lists components for the implementation of such systems; and
provides architectural views contextualizing these components.
ISO/IEC 29101:2013 is applicable to entities involved in specifying,…
Information technology - Security techniques - Privacy architecture framework
ISO/IEC 29101:2013 defines a privacy architecture framework that
specifies concerns for information and communication technology (ICT) systems that process personally identifiable information (PII);
lists components for the implementation of such systems; and
provides architectural views contextualizing these components.
ISO/IEC 29101:2013 is applicable to entities involved in specifying,…
Health informatics — Sharing of OID registry information
ISO/TS 13582:2013 specifies the mandatory and optional information to be recorded in any registry of OIDs, using an information model.
It specifies which parts of that information are to be regarded as public, and which parts are to be subject to security and privacy requirements.
Information technology — Biometric data interchange formats — Part 14: DNA data
ISO/IEC 19794-14:2013 specifies a data interchange format for the exchange of DNA data for person identification or verification technologies that utilize human DNA.
It will provide the ability for DNA profile data to be exchanged and used for comparison (subject to privacy regulations) with DNA profile data produced by any other system that is based on a compatible DNA profiling technique and…