Human resource management — Diversity and inclusion
This document provides guidance on D&I for organizations, including their governance body, leaders, workforce and recognized representatives, and other stakeholders. It is intended to be scalable to the needs of all types of organizations in different sectors, whether in public, private, government or non-governmental organizations (NGO), regardless of size, type, activity, industry or sector…
Information and documentation — International archives statistics
This document specifies guidelines for the archives community on the collection and reporting of statistics for the following purposes:
— strategic planning and internal management of archives;
— aggregating and comparing operational and performance statistics at regional, national, and international levels;
— reporting to stakeholders such as funding institutions, politicians,…
Health informatics — Token-based health information sharing
This document specifies the data element content and exchange format for tokens used in token-based health information sharing. It includes
a) the data items that may be contained in a health information token (HI-TOKEN),
b) the value representation for each data item,
c) the exchange formats allowed for HI-TOKEN sharing (electronic, machine-readable symbol, print), and
d) considerations when…
Compliance management systems — Requirements with guidance for use
This document specifies requirements and provides guidelines for establishing, developing, implementing, evaluating, maintaining and improving an effective compliance management system within an organization.
This document is applicable to all types of organizations regardless of the type, size and nature of the activity, as well as whether the organization is from the public, private or non-…
Information technology — JPSearch — Part 2: Registration, identification and management of schema an...
This document specifies a series of interfaces to allow disparate systems an interoperable management of image repositories. It also specifies the general rules which govern the usage of metadata in JPSearch and provides a specification which
provides rules for the representation of image metadata descriptions, consisting of the definition of the JPSearch Core Metadata Schema,
provides rules for…
Information technology - JPSearch - Part 2: Registration, identification and management of schema an...
This document specifies a series of interfaces to allow disparate systems an interoperable management of image repositories. It also specifies the general rules which govern the usage of metadata in JPSearch and provides a specification which
provides rules for the representation of image metadata descriptions, consisting of the definition of the JPSearch Core Metadata Schema,
provides rules for…
Health software and health IT systems safety, effectiveness and security - Part 1: Principles and co...
This document provides the principles, concepts, terms and definitions for health software and health IT systems, key properties of safety, effectiveness and security, across the full life cycle, from concept to decommissioning, as represented in Figure 1. It also identifies the transition points in the life cycle where transfers of responsibility occur, and the types of multi-lateral…
Health software and health IT systems safety, effectiveness and security — Part 1: Principles and co...
This document provides the principles, concepts, terms and definitions for health software and health IT systems, key properties of safety, effectiveness and security, across the full life cycle, from concept to decommissioning, as represented in Figure 1. It also identifies the transition points in the life cycle where transfers of responsibility occur, and the types of multi-lateral…
The measures in this standard were calculated from detecting and counting violations of good architectural and coding practices in the source code that could result in unacceptable operational risks or excessive costs. Establishing standards for these measures at the source code level is important because they have been used in outsourcing and system development contracts without having…
The measures in this standard were calculated from detecting and counting violations of good architectural and coding practices in the source code that could result in unacceptable operational risks or excessive costs. Establishing standards for these measures at the source code level is important because they have been used in outsourcing and system development contracts without having…