Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 51 - 60 de 410
Information and documentation — RFID in libraries — Part 1: Data elements and general guidelines for...
This document specifies a model for the use of radio frequency identification (RFID) tags for items appropriate for the needs of all types of libraries, including national, academic, public, corporate, special, and school. It provides the framework to ensure interoperability between libraries that exchange library items with RFID tags, the freedom of the library to acquire or renew equipment or…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2023-06-08
Code(s) de l'ICS :
35.240.30; 35.040.50
Health informatics — Personalized digital health — Digital therapeutics health software systems
This document lists characteristics of a category of health software: digital therapeutics (DTx). DTx products generate and deliver medical interventions that are based on clinical evidence, have demonstrable positive therapeutic impacts on patient health, and produce real-world outcomes. Product use cases (see Annex B) demonstrate the variety of products represented in this quickly growing…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2023-06-05
Code(s) de l'ICS :
35.240.80
Security and privacy in artificial intelligence use cases — Best practices
This document outlines best practices on assessing security and privacy in artificial intelligence use cases, covering in particular those published in ISO/IEC TR 24030. The following aspects are addressed: —    an overall assessment of security and privacy on the AI system of interest; —    security and privacy concerns; —    security and privacy risks; —    security and privacy controls; —   …
Éditeur :
ISO
Statut :
Publié
Date de publication :
2023-05-24
Code(s) de l'ICS :
35.020
Security and privacy in artificial intelligence use cases - Best practices
This document outlines best practices on assessing security and privacy in artificial intelligence use cases, covering in particular those published in ISO/IEC TR 24030. The following aspects are addressed: — an overall assessment of security and privacy on the AI system of interest; — security and privacy concerns; — security and privacy risks; — security and privacy controls; —…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2023-05-24
Code(s) de l'ICS :
35.020
Information technology — User interfaces — Full duplex speech interaction
This document specifies user interfaces (UIs) designed for full duplex (FDX) speech interaction. It also specifies the FDX speech interaction model, features, functional components and requirements, thus providing a framework to support natural conversational interfaces between humans and machines. It also provides privacy considerations for applying FDX speech interaction. This document is…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2023-05-21
Code(s) de l'ICS :
35.240.20
Information technology - User interfaces - Full duplex speech interaction
This document specifies user interfaces (UIs) designed for full duplex (FDX) speech interaction. It also specifies the FDX speech interaction model, features, functional components and requirements, thus providing a framework to support natural conversational interfaces between humans and machines. It also provides privacy considerations for applying FDX speech interaction. This document is…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2023-05-21
Code(s) de l'ICS :
35.240.20
Document management — Information classification, marking and handling — Part 1: Requirements
This document specifies requirements for information classification, marking and handling (ICMH). This document also defines how such information can be accessed by users, both inside and outside the organization, who own the information. This document is applicable to, but not limited to, the following: a)    organizations of any size that create, store, share or otherwise process information; b…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2023-05-09
Code(s) de l'ICS :
37.080
Information technology — Security techniques — Guidelines for privacy impact assessment
This document gives guidelines for: —    a process on privacy impact assessments, and —    a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations. This document is relevant to those involved in designing or implementing projects, including the parties…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2023-05-07
Code(s) de l'ICS :
35.030
Information technology - Security techniques - Guidelines for privacy impact assessment
This document gives guidelines for: — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations. This document is relevant to those involved in designing or implementing projects, including the parties…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2023-05-07
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Verification of cryptographic protocols...
This document establishes a framework for the verification of cryptographic protocol specifications according to academic and industry best practices.
Éditeur :
ISO
Statut :
Publié
Date de publication :
2023-03-19
Code(s) de l'ICS :
35.030