Greenhouse gases — Part 5: Guidance on activities and techniques used remotely in conducting verific...
This document provides guidance for conducting verification and validation of greenhouse gas statements (claims) using of remote methods. It is applicable to all organizations and products that need to plan and conduct internal or external verification/validation (i.e. 1st, 2nd , 3rd party) of greenhouse gas statements.
This document additionally provides competence for verifier/validator in…
Évaluation de la conformité — Recommandations pour la rédaction de documents normatifs applicables à...
Ce document fournit des principes et des directives pour l'élaboration de documents normatifs contenant
des exigences spécifiées que les objets de l'évaluation de la conformité doivent satisfaire,
des exigences spécifiées relatives aux systèmes d'évaluation de la conformité pouvant être utilisés pour démontrer qu'un objet de l'évaluation de la conformité satisfait aux…
Conformity assessment — Guidance for drafting normative documents suitable for use for conformity as...
This document provides principles and guidance for developing normative documents that contain:
specified requirements for objects of conformity assessment to fulfil;
specified requirements for conformity assessment systems that can be employed when demonstrating whether an object of conformity assessment fulfils specified requirements.
This document is intended for use by standards developers…
Information technology — Artificial intelligence — Requirements for bodies providing audit and certi...
This document specifies additional requirements for ISO/IEC 17021-1 in order to enable accredited and or peer assessed certification bodies to reliably audit the management system for organizations that develop or use AI systems or both according to ISO/IEC 42001 and to make an evaluation and decision for certification. The application of this document enables the certification bodies to meet the…
Information security, cybersecurity and privacy protection — Testing cryptographic modules in their ...
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization's security system.
The cryptographic modules have four security levels which ISO/IEC 19790 defines to provide for a wide spectrum of data sensitivity (e.g. low-value administrative data,…
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit...
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.
The…