Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 481 - 490 de 1079
Information technology — Learning, education and training — Metadata for learning resources — Part 4...
ISO/IEC 19788-4:2014 specifies, in a rule-based manner, metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of metadata elements and the specification of metadata attributes. These metadata elements are used to form the description of a learning resource, i.e. as a metadata learning resource (MLR) record. This part…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2014-11-19
Code(s) de l'ICS :
03.100.30; 35.240.90
Information technology - Learning, education and training - Metadata for learning resources - Part 4...
ISO/IEC 19788-4:2014 specifies, in a rule-based manner, metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of metadata elements and the specification of metadata attributes. These metadata elements are used to form the description of a learning resource, i.e. as a metadata learning resource (MLR) record. This part…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2014-11-19
Code(s) de l'ICS :
03.100.30; 35.240.90
Guidance on outsourcing
ISO 37500:2014 covers the main phases, processes and governance aspects of outsourcing, independent of size and sectors of industry and commerce. It is intended to provide a good foundation to enable organizations to enter into, and continue to sustain, successful outsourcing arrangements throughout the contractual period. ISO 37500:2014 gives guidance on: · good outsourcing governance…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2014-10-30
Code(s) de l'ICS :
03.080.01
Health informatics — Capacity-based eHealth architecture roadmap — Part 2: Architectural components ...
ISO/TR 14639:2014 provides a guide to best practice business requirements and principles for countries and their subordinate health authorities planning and implementing the use of information and communications technology (ICT) to support the delivery and development of healthcare. A business reference architecture is described in terms of components and capabilities that health authorities may…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2014-10-09
Code(s) de l'ICS :
35.240.80
Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 17788:2014 provides an overview of cloud computing along with a set of terms and definitions. It is a terminology foundation for cloud computing standards. ISO/IEC 17788:2014 is applicable to all types of organizations (e.g., commercial enterprises, government agencies, not-for-profit organizations).
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2014-10-09
Code(s) de l'ICS :
01.040.35; 35.020
Information technology - Cloud computing - Overview and vocabulary
ISO/IEC 17788:2014 provides an overview of cloud computing along with a set of terms and definitions. It is a terminology foundation for cloud computing standards. ISO/IEC 17788:2014 is applicable to all types of organizations (e.g., commercial enterprises, government agencies, not-for-profit organizations).
Éditeur :
IEC
Statut :
Remplacé
Date de publication :
2014-10-09
Code(s) de l'ICS :
01.040.35; 35.020
Information technology — Security techniques — Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment. In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2014-07-28
Code(s) de l'ICS :
35.030
Information technology - Security techniques - Code of practice for protection of personally identif...
ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in accordance with the privacy principles in ISO/IEC 29100 for the public cloud computing environment. In particular, ISO/IEC 27018:2014 specifies guidelines based on ISO/IEC 27002, taking into consideration the regulatory…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2014-07-28
Code(s) de l'ICS :
35.030
Information technology — Security techniques — Information security for supplier relationships — Par...
ISO/IEC 27036-2:2014 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2014-07-24
Code(s) de l'ICS :
35.030
Information technology - Security techniques - Information security for supplier relationships - Par...
ISO/IEC 27036-2:2014 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These requirements cover any procurement and supply of products and services, such as manufacturing or assembly, business process procurement, software and hardware components, knowledge process…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2014-07-24
Code(s) de l'ICS :
35.030

Spacer