Insulation co-ordination - Part 2: Application guidelines
IEC 60071-2:2023 RLV contains both the official IEC International Standard and its Redline version. The Redline version is available in English only and provides you with a quick and easy way to compare all the changes between the official IEC Standard and its previous edition.
IEC 60071-2:2023 constitutes application guidelines and deals with the selection of insulation levels of equipment or…
Insulation co-ordination - Part 2: Application guidelines
IEC 60071-2:2023 constitutes application guidelines and deals with the selection of insulation levels of equipment or installations for three-phase AC systems. Its aim is to give guidance for the determination of the rated withstand voltages for ranges I and II of IEC 60071‑1 and to justify the association of these rated values with the standardized highest voltages for equipment. This…
Document management — Information classification, marking and handling — Part 1: Requirements
This document specifies requirements for information classification, marking and handling (ICMH). This document also defines how such information can be accessed by users, both inside and outside the organization, who own the information.
This document is applicable to, but not limited to, the following:
a) organizations of any size that create, store, share or otherwise process information;
b…
Information technology — Security techniques — Guidelines for privacy impact assessment
This document gives guidelines for:
— a process on privacy impact assessments, and
— a structure and content of a PIA report.
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.
This document is relevant to those involved in designing or implementing projects, including the parties…
Information technology - Security techniques - Guidelines for privacy impact assessment
This document gives guidelines for:
— a process on privacy impact assessments, and
— a structure and content of a PIA report.
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.
This document is relevant to those involved in designing or implementing projects, including the parties…
Data Governance - Part 8: Framework for Geo-Residency and Sovereignty
This Standard aims to specify the minimum requirements for Organizations to protect data assets in
their custody from jurisdictional risks, while taking advantage of the global technology ecosystem.
The Standard is not intended to prescribe how an Organization should implement specific security
controls. Instead, the standard will guide Organizations using jurisdictional and technology-…
Information technology — Artificial intelligence — Artificial intelligence concepts and terminology
1 Scope
This document establishes terminology for AI and describes concepts in the field of AI.
This document can be used in the development of other standards and in support of communications among diverse, interested parties or stakeholders.
This document is applicable to all types of organizations (e.g. commercial enterprises, government agencies, not-for-profit organizations).
Purpose
This standard provides LTC home teams, leaders, and governing bodies with criteria and guidelines for delivering resident-centred, high-quality care, enabled by a healthy and competent workforce.
Applicability
This standard applies to teams, leaders, and governing bodies of LTC homes. LTC homes, also referred to as continuing care, personal care, or nursing homes, are settings where…
Information technology — Governance of IT — Governance implications of the use of artificial intelli...
1 Scope
This document provides guidance for members of the governing body of an organization to enable and govern the use of Artificial Intelligence (AI), in order to ensure its effective, efficient and acceptable use within the organization.
This document also provides guidance to a wider community, including:
— executive managers;
— external businesses or technical specialists, such as…
Information security, cybersecurity and privacy protection – Privacy enhancing data de-identificatio...
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller’s behalf,…