This document provides guidelines for the service process and operations management of live streaming host, live streaming marketing platform, live streaming marketer, and multi-channel network agency (MCN agency) in the process of carrying out live streaming marketing services. This document is applicable to the parties involved in live streaming marketing services.
This document does not cover…
Privacy technologies — Consent record information structure
This document specifies an interoperable, open and extensible information structure for recording PII principals' consent to PII processing. This document provides requirements and recommendations on the use of consent receipts and consent records associated with a PII principal's PII processing consent, aiming to support the:
— provision of a record of the consent to the PII…
Privacy technologies - Consent record information structure
This document specifies an interoperable, open and extensible information structure for recording PII principals' consent to PII processing. This document provides requirements and recommendations on the use of consent receipts and consent records associated with a PII principal's PII processing consent, aiming to support the:
— provision of a record of the consent to the PII…
Human resource management — Workforce data quality
This document provides the basis for organizational improvement underpinned by quality workforce data that supports analysis and evidenced-based decision-making.
Workforce data quality, for the purpose of this document, is the process of:
a) workforce data determination;
b) data capture;
c) data maintenance;
d) data review processes.
The focus of this document is on the…
Cybersecurity — Security recommendations for establishing trusted connections between devices and se...
This document provides a framework and recommendations for establishing trusted connections between devices and services based on hardware security modules. It includes recommendations for components such as: hardware security module, roots of trust, identity, authentication and key establishment, remote attestation, data integrity and authenticity.
This document is applicable to scenarios that…
Cybersecurity - Security recommendations for establishing trusted connections between devices and se...
This document provides a framework and recommendations for establishing trusted connections between devices and services based on hardware security modules. It includes recommendations for components such as: hardware security module, roots of trust, identity, authentication and key establishment, remote attestation, data integrity and authenticity.
This document is applicable to scenarios that…
Information and documentation — RFID in libraries — Part 4: Encoding of data elements based on rules...
This document defines rules for ISO 28560-1 data elements to be encoded in radio frequency identification (RFID) tags with a memory structure that is partitioned into four memory banks. This primarily applies to ISO/IEC 18000-63 (previously known as ISO/IEC 18000-6 Type C) operating in the UHF frequency, but not necessarily restricted to this technology.
The rules for encoding a subset of data…
Information and documentation — RFID in libraries — Part 1: Data elements and general guidelines for...
This document specifies a model for the use of radio frequency identification (RFID) tags for items appropriate for the needs of all types of libraries, including national, academic, public, corporate, special, and school.
It provides the framework to ensure interoperability between libraries that exchange library items with RFID tags, the freedom of the library to acquire or renew equipment or…