Information security, cybersecurity and privacy protection — Privacy information management systems ...
This document specifies requirements for establishing, implementing, maintaining and continually improving a privacy information management system (PIMS).
Guidance is provided to assist in the implementation of the controls in this document.
This document is intended for PII controllers and PII processors holding responsibility and accountability for PII processing.
This document is applicable to…
Information security, cybersecurity and privacy protection — Information security management systems...
ISO/IEC 27000:2018 provides the overview of information security management systems (ISMS). It also provides terms and definitions commonly used in the ISMS family of standards. This document is applicable to all types and sizes of organization (e.g. commercial enterprises, government agencies, not-for-profit organizations).
The terms and definitions provided in this document
- cover commonly…
Information technology — Cross jurisdictional and societal aspects of implementation of biometric te...
This document provides guidance on the specific considerations that need to be given when using
biometrics for major incident response. The following aspects are included within the scope of this
document:
• managing people and their identities (living or deceased) to co-ordinate the emergency response
effort
• linking reported missing persons to unidentified victims, reuniting relatives and…
This document specifies the contact tracing of the confirmed cases of infectious diseases for a public health emergency (PHE) response. The scope of the document includes:
overview and general procedures of contact tracing
requirements and privacy protection guidance in contact tracing The procedures given in this document may be applicable to the contact tracing except that the procedures…
Information technology — Cloud computing — Edge computing landscape
This document examines the concept of edge computing, its relationship to cloud computing and IoT, and the technologies that are key to the implementation of edge computing. This document explores the following topics with respect to edge computing:
— concept of edge computing systems;
— architectural foundation of edge computing;
— edge computing terminology;
— software classifications in edge…
Information security, cybersecurity and privacy protection – Guidelines for protection of personally...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, this document specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory requirements for the…
This proposed standard is for anybody who creates or help create legal and related documents. It builds, and relies, on the foundation for plain language in WD 24495-1, Plain Language — Part 1: Governing Principles and Guidelines. This standard, Plain Language — Part 2 Legal Writing and Drafting, will add guidance and techniques to help authors make sure that people affected by legal and related…
Information security, cybersecurity and privacy protection — Requirements for the competence of IT s...
This document provides the specialized requirements to demonstrate competence of individuals in performing IT product security evaluations and certifications in accordance with the ISO/IEC 15408 8 series and ISO/IEC 18045.