Emergency preparedness and response for petroleum and natural gas industry systems
1 Scope
1.1
This Standard establishes criteria for emergency preparedness and response for the petroleum and natural gas industry systems.
Note: Prevention, continuity, and recovery are addressed in other standards.
1.2
This Standard applies to petroleum and natural gas industry systems (see Figures 1 and 2), including
a)
pipeline systems handling
i)
oil;
ii)
gas;
iii)
oil-field…
1 Scope
1.1
This Standard specifies the requirements for all types of welded aluminum construction with the exception of those types listed in Clause 1.2. Common requirements that are essential to all structures, including statically-loaded structures and cyclically-loaded structures, are included in this Standard.
1.2
This Standard is not intended to apply to pressure vessels or to…
Information technology — Vocabulary — Part 37: Biometrics
1 Scope
This document establishes a systematic description of the concepts in the field of biometrics pertaining to recognition of human beings and reconciles variant terms in use in pre-existing biometric standards against the preferred terms, thereby clarifying the use of terms in this field.
Excluded from the scope of this document are concepts (represented by terms) from information…
Information technology — Telecommunications and information exchange between systems — Local and met...
1.1 Scope
The scope of this standard is to define a protocol and management elements, suitable for advertising
information to stations attached to the same IEEE 802 LAN, for the purpose of populating physical topology
and device discovery management information databases. The protocol facilitates the identification of
stations connected by IEEE 802 LANs/MANs, their points of interconnection,…
Information technology — Security techniques — Information security for supplier relationships — Par...
1 Scope
This part of ISO/IEC 27036 specifies fundamental information security requirements for defining,
implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer
relationships.
These requirements cover any procurement and supply of products and services, such as manufacturing
or assembly, business process procurement, software and hardware components,…
Information technology — Security techniques — Storage security
1 Scope
This International Standard provides detailed technical guidance on how organizations can define
an appropriate level of risk mitigation by employing a well-proven and consistent approach to the
planning, design, documentation, and implementation of data storage security. Storage security applies
to the protection (security) of information where it is stored and to the security of the…
Information technology — Security techniques — Guidance on assuring suitability and adequacy of inci...
1 Scope
This International Standard provides guidance on mechanisms for ensuring that methods and processes
used in the investigation of information security incidents are “fit for purpose”. It encapsulates best
practice on defining requirements, describing methods, and providing evidence that implementations of
methods can be shown to satisfy requirements. It includes consideration of how…
Information technology — Security techniques — Code of practice for personally identifiable informat...
1 Scope
This Recommendation | International Standard establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).
In particular, this Recommendation | International Standard specifies guidelines based on ISO/IEC 27002, taking into…
Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 3850...
1 Scope
This document provides guiding principles for members of governing bodies of organizations (which can comprise owners, directors, partners, executive managers, or similar) on the effective, efficient, and acceptable use of data within their organizations by
— applying the governance principles and model of ISO/IEC 38500 to the governance of data,
— assuring stakeholders that, if the…
Information technology — Security techniques — Network security — Part 4: Securing communications be...
1 Scope
This part of ISO/IEC 27033 gives guidance for securing communications between networks using
security gateways (firewall, application firewall, Intrusion Protection System, etc.) in accordance with
a documented information security policy of the security gateways, including:
a) identifying and analysing network security threats associated with security gateways;
b) defining network…