Information technology — Business Operational View — Part 8: Identification of privacy protection re...
This part of ISO/IEC 15944:
? provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the
additional requirements in Business Operational View (BOV) specifications for identifying the additional
external constraints to be applied to recorded information in business transactions relating to personal
information of an individual, as required by legal and…
Information technology — Business Operational View — Part 7: eBusiness vocabulary (ISO/IEC 15944-7:2...
This part of ISO/IEC 15944 provides a consolidated vocabulary of eBusiness concepts as found and defined
in the current editions of ISO/IEC 14662 and the existing parts of ISO/IEC 15944, namely, Parts 1, 2, 4, 5, 6
and 7 along with their associated terms.
NOTE At the time of publication of this part of ISO/IEC 15944, Parts 1, 2, 4, 5 and 6 have been published, the
development of Part 3 has been…
Information technology — Business Operational View — Part 5: Identification and referencing of requi...
1.1 Statement of scope
The modelling of a business transaction through scenarios and scenario components is done by specifying
the applicable constraints through explicitly stated rules. The Open-edi Reference Model identified two basic
classes of constraints, namely “internal constraints” and “external constraints” (see further Annex G).
ISO/IEC 15944-4 focuses on internal constraints with a…
Information and operations security and integrity requirements for lottery and gaming organizations
IWA 17:2014 covers all types of lottery and gaming organizations, including commercial enterprises, government agencies and non-profit organizations. IWA 17:2014 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented security and integrity system within the context of the organization's overall risks. It specifies…
Information technology — Learning, education and training — Metadata for learning resources — Part 4...
ISO/IEC 19788-4:2014 specifies, in a rule-based manner, metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of metadata elements and the specification of metadata attributes.
These metadata elements are used to form the description of a learning resource, i.e. as a metadata learning resource (MLR) record.
This part…
Information technology - Learning, education and training - Metadata for learning resources - Part 4...
ISO/IEC 19788-4:2014 specifies, in a rule-based manner, metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of metadata elements and the specification of metadata attributes.
These metadata elements are used to form the description of a learning resource, i.e. as a metadata learning resource (MLR) record.
This part…
Health informatics — Capacity-based eHealth architecture roadmap — Part 2: Architectural components ...
ISO/TR 14639:2014 provides a guide to best practice business requirements and principles for countries and their subordinate health authorities planning and implementing the use of information and communications technology (ICT) to support the delivery and development of healthcare. A business reference architecture is described in terms of components and capabilities that health authorities may…
Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 17788:2014 provides an overview of cloud computing along with a set of terms and definitions. It is a terminology foundation for cloud computing standards.
ISO/IEC 17788:2014 is applicable to all types of organizations (e.g., commercial enterprises, government agencies, not-for-profit organizations).
Information technology - Cloud computing - Overview and vocabulary
ISO/IEC 17788:2014 provides an overview of cloud computing along with a set of terms and definitions. It is a terminology foundation for cloud computing standards.
ISO/IEC 17788:2014 is applicable to all types of organizations (e.g., commercial enterprises, government agencies, not-for-profit organizations).
Information technology — Security techniques — Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…