Tools for pressing — Gas springs — Part 2: Specification of accessories
This document specifies the dimensions in millimetres, of mounting base plates, of two-part mounting clamps, of flange mounts and front end supports intended for use in press tool together with gas springs in accordance with ISO 11901‑1, ISO 11901‑3 and ISO 11901‑4.
It also gives information concerning materials and specifies the designation of the mounting accessories in accordance with this…
Information technology, cybersecurity and privacy protection — Requirements for bodies providing aud...
This document specifies requirements and provides guidance for bodies providing audit and certification of a privacy information management system (PIMS) according to ISO/IEC 27701 in combination with ISO/IEC 27001, in addition to the requirements contained within ISO/IEC 27006. It is primarily intended to support the accreditation of certification bodies providing PIMS certification.
The…
Geographic information — Geospatial API for features — Part 1: Core
This document specifies the behaviour of Web APIs that provide access to features in a dataset in a manner independent of the underlying data store. This document defines discovery and query operations.
Discovery operations enable clients to interrogate the API, including the API definition and metadata about the feature collections provided by the API, to determine the capabilities of the API…
Cards and security devices for personal identification — Test methods — Part 6: Contactless proximit...
The ISO/IEC 10373 series defines test methods for characteristics of identification cards according to the definition given in ISO/IEC 7810. Each test method is cross‑referenced to one or more base standards, which can be ISO/IEC 7810 or one or more of the supplementary standards that define the information storage technologies employed in identification card applications.
NOTE 1 Criteria for…
Information technology — Security techniques — Random bit generation
This document specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.
This document specifies the characteristics of the main elements required for both non-deterministic and deterministic random bit generators. It also establishes the security requirements for both non- deterministic and deterministic random bit generators.…