Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 191 - 200 de 551
Information technology — Security techniques — Information security for supplier relationships — Par...
1 Scope This part of ISO/IEC 27036 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components,…
Éditeur :
CSA
Statut :
Annulée
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.040
Information technology — Security techniques — Code of practice for personally identifiable informat...
1 Scope This Recommendation | International Standard establishes control objectives, controls and guidelines for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII). In particular, this Recommendation | International Standard specifies guidelines based on ISO/IEC 27002, taking into…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.030
Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 3850...
1 Scope This document provides guiding principles for members of governing bodies of organizations (which can comprise owners, directors, partners, executive managers, or similar) on the effective, efficient, and acceptable use of data within their organizations by — applying the governance principles and model of ISO/IEC 38500 to the governance of data, — assuring stakeholders that, if the…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.020
Information technology — Security techniques — Governance of information security
1 Scope This Recommendation | International Standard provides guidance on concepts and principles for the governance of information security, by which organisations can evaluate, direct, monitor and communicate the information security related activities within the organisation. This International Standard is applicable to all types and sizes of organisations
Éditeur :
CSA
Statut :
Annulée
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.040
Information technology — Security techniques — Guidelines for privacy impact assessment
1 Scope This document gives guidelines for — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations. This document is relevant to those involved in designing or implementing projects, including the…
Éditeur :
CSA
Statut :
Annulée
Date de publication :
2018-08-31
Code(s) de l'ICS :
35.030
Welded aluminum construction
1 Scope 1.1 This Standard specifies the requirements for all types of welded aluminum construction with the exception of those types listed in Clause 1.2. Common requirements that are essential to all structures, including statically-loaded structures and cyclically-loaded structures, are included in this Standard. 1.2 This Standard is not intended to apply to pressure vessels or to…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2018-08-31
Code(s) de l'ICS :
25.160.10; 91.080.10
Information technology — Security techniques — Information security risk management
This document provides guidelines for information security risk management. This document supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2018-07-08
Code(s) de l'ICS :
35.030
Information technology - Security techniques - Information security risk management
This document provides guidelines for information security risk management. This document supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2018-07-08
Code(s) de l'ICS :
35.030
Information technology — Security techniques — Testing cryptographic modules in their operational en...
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization's security system. The cryptographic modules have four security levels which ISO/IEC 19790 defines to provide for a wide spectrum of data sensitivity (e.g. low-value administrative data,…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2018-05-17
Code(s) de l'ICS :
35.030
Information technology — Guidance for biometric enrolment
This document consolidates information relating to successful, secure and usable implementation of biometric enrolment processes, while indicating risk factors that organisations proposing to use biometric technologies will should address during procurement, design, deployment and operation. Much of the information is generic to many types of application, e.g. from national scale commercial and…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2018-05-17
Code(s) de l'ICS :
35.240.15

Spacer