Information technology — Learning, education and training — Metadata for learning resources — Part 4...
ISO/IEC 19788-4:2014 specifies, in a rule-based manner, metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of metadata elements and the specification of metadata attributes.
These metadata elements are used to form the description of a learning resource, i.e. as a metadata learning resource (MLR) record.
This part…
Information technology - Learning, education and training - Metadata for learning resources - Part 4...
ISO/IEC 19788-4:2014 specifies, in a rule-based manner, metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of metadata elements and the specification of metadata attributes.
These metadata elements are used to form the description of a learning resource, i.e. as a metadata learning resource (MLR) record.
This part…
ISO 37500:2014 covers the main phases, processes and governance aspects of outsourcing, independent of size and sectors of industry and commerce. It is intended to provide a good foundation to enable organizations to enter into, and continue to sustain, successful outsourcing arrangements throughout the contractual period.
ISO 37500:2014 gives guidance on:
· good outsourcing governance…
Health informatics — Capacity-based eHealth architecture roadmap — Part 2: Architectural components ...
ISO/TR 14639:2014 provides a guide to best practice business requirements and principles for countries and their subordinate health authorities planning and implementing the use of information and communications technology (ICT) to support the delivery and development of healthcare. A business reference architecture is described in terms of components and capabilities that health authorities may…
Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 17788:2014 provides an overview of cloud computing along with a set of terms and definitions. It is a terminology foundation for cloud computing standards.
ISO/IEC 17788:2014 is applicable to all types of organizations (e.g., commercial enterprises, government agencies, not-for-profit organizations).
Information technology - Cloud computing - Overview and vocabulary
ISO/IEC 17788:2014 provides an overview of cloud computing along with a set of terms and definitions. It is a terminology foundation for cloud computing standards.
ISO/IEC 17788:2014 is applicable to all types of organizations (e.g., commercial enterprises, government agencies, not-for-profit organizations).
Information technology — Security techniques — Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Information technology - Security techniques - Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Information technology — Security techniques — Information security for supplier relationships — Par...
ISO/IEC 27036-2:2014 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships.
These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process…
Information technology - Security techniques - Information security for supplier relationships - Par...
ISO/IEC 27036-2:2014 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships.
These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process…