Information technology — City service platform for public health emergencies — Part 1: Overview and ...
This document specifies the general requirements for a city service platform for public health emergencies. It also specifies the requirements in terms of data, functions, security and privacy protection.
Information technology - Use of biometrics in video surveillance systems - Part 1: System design and...
The ISO/IEC 30137 series is applicable to the use of biometrics in VSSs (also known as closed circuit television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post-event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities, such as gait…
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and...
The ISO/IEC 30137 series is applicable to the use of biometrics in VSSs (also known as closed circuit television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post-event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities, such as gait…
Information security, cybersecurity and privacy protection - Ontology building blocks for security a...
This document defines an inventory of building blocks conceptually associated with different types of assessments of information and communication technology (ICT) trustworthiness. These assessments apply to areas such as governance, risk management, security evaluation, secure development lifecycle (SDL), supply chain integrity and privacy. This document also defines an ontology that organizes…
Information security, cybersecurity and privacy protection — Ontology building blocks for security a...
This document defines an inventory of building blocks conceptually associated with different types of assessments of information and communication technology (ICT) trustworthiness. These assessments apply to areas such as governance, risk management, security evaluation, secure development lifecycle (SDL), supply chain integrity and privacy. This document also defines an ontology that organizes…
Information security, cybersecurity and privacy protection - Requirements for bodies providing audit...
This document specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1.
The requirements contained in this document are demonstrated in terms of competence and reliability by bodies providing ISMS certification. The guidance contained in this…
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit...
This document specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1.
The requirements contained in this document are demonstrated in terms of competence and reliability by bodies providing ISMS certification. The guidance contained in this…
Special requirements for digital infrastructure and digital health care technologies in Canadian hea...
Scope
1.1 General
This Standard provides a framework for the planning, design, and implementation of foundational digital infrastructure to support current and future health care data and technologies used in HCFs. It will address common integration requirements within the HCF and opportunities across the continuum of care. It is intended to assist in determining foundational investments that…
Information security, cybersecurity and privacy protection — Guidance on managing information securi...
1 Scope
This document provides guidance to assist organizations to:
— fulfil the requirements of ISO/IEC 27001 concerning actions to address information security risks;
— perform information security risk management activities, specifically information security risk assessment and treatment.
This document is applicable to all organizations, regardless of type, size or sector.
Information security, cybersecurity and privacy protection — Security and privacy requirements for a...
Scope
This document provides high-level security and privacy requirements and recommendations for authentication using biometrics on mobile devices, including security and privacy requirements and recommendations for functional components and for communication.
This document is applicable to the cases that the biometric data and derived biometric data do not leave the device, i.e. local modes