Information technology - Artificial intelligence - Controllability of automated artificial intellige...
This document specifies a basic framework with principles, characteristics and approaches for the realization and enhancement for automated artificial intelligence (AI) systems’ controllability.
The following areas are covered:
— state observability and state transition;
— control transfer process and cost;
— reaction to uncertainty during control transfer;
— verification and…
Information technology — Artificial intelligence — Controllability of automated artificial intellige...
This document specifies a basic framework with principles, characteristics and approaches for the realization and enhancement for automated artificial intelligence (AI) systems’ controllability.
The following areas are covered:
— state observability and state transition;
— control transfer process and cost;
— reaction to uncertainty during control transfer;
— verification and…
Information technology - Business operational view - Part 17: Fundamental principles and rules gover...
This document:
a) focuses on PbD aspects of privacy protection requirements as external constraints on any type of Person, (e.g. organization or public administration) involved in any kind of business transaction among such Persons which involves the electronic data interchange (EDI) of any personal information;
b) establishes a fundamental set of privacy principles known as Privacy…
Information technology — Business operational view — Part 17: Fundamental principles and rules gover...
This document:
a) focuses on PbD aspects of privacy protection requirements as external constraints on any type of Person, (e.g. organization or public administration) involved in any kind of business transaction among such Persons which involves the electronic data interchange (EDI) of any personal information;
b) establishes a fundamental set of privacy principles known as Privacy…
Privacy - Part 2: Canadian Information Privacy Protection Framework
Scope
This standard specifies minimum requirements for organizations that access, collect, use, retain, and disclose personal information, and offers any benefit or consideration regardless of monetary exchange for such benefit or consideration.
The standard aims to provide a baseline framework for organizations seeking to harmonize conformance to the various provincial/territorial, federal,…
1 Scope
1.1 Equipment within scope
Except as indicated in Clause 1.2, this Standard applies to all pressure equipment including
a)
boilers, pressure vessels, pressure piping, and fittings, as provided for by the Act (as defined in Clause 3) and identified in this Standard; and
b)
compressed natural gas and hydrogen refuelling station pressure piping systems and storage pressure vessels.…
Equity, diversity, inclusion, and accessibility in apprenticeship programs
1 Scope
1.1 Inclusions
This Standard specifies requirements and provides guidelines for equity, diversity, inclusion, and accessibility (EDIA) in apprenticeship programs.
This Standard is applicable to all aspects of an apprenticeship system including pre-apprenticeship, classroom learning, mentorship, and on-the-job training delivered in an apprenticeable trade, and for which successful…
Information technology - Use of biometrics in video surveillance systems - Part 1: System design and...
The ISO/IEC 30137 series is applicable to the use of biometrics in VSSs (also known as closed circuit television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post-event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities, such as gait…
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and...
The ISO/IEC 30137 series is applicable to the use of biometrics in VSSs (also known as closed circuit television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post-event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities, such as gait…
Information security, cybersecurity and privacy protection - Ontology building blocks for security a...
This document defines an inventory of building blocks conceptually associated with different types of assessments of information and communication technology (ICT) trustworthiness. These assessments apply to areas such as governance, risk management, security evaluation, secure development lifecycle (SDL), supply chain integrity and privacy. This document also defines an ontology that organizes…