Perception de télépéage — Communications d'augmentation de localisations pour systèmes autonome...
Le présent document définit les exigences pour une communication à courte portée en vue de mettre en place l'augmentation de localisations dans les systèmes de perception de télépéage (EFC) autonomes. L'augmentation de localisations sert à informer les équipements embarqués (OBE) de leur position géographique et à l'identification d'un objet d'imputation. Le présent…
Cable networks for television signals, sound signals and interactive services - Part 201: A study of...
IEC TR 60728-201:2024 describes the technical background of IPTV systems and commercially available products related to audio, video and multimedia systems and equipment to enable cable operators and customers to understand current IPTV systems that include application, middleware, network, equipment and terminal devices. This document is to encourage all TA5 experts to develop new IS related to…
Information technology - Security techniques - Privacy framework
This document provides a privacy framework which:
— specifies a common privacy terminology;
— defines the actors and their roles in processing personally identifiable information (PII);
— describes privacy safeguarding considerations;
— provides references to known privacy principles for information technology.
This document is applicable to natural persons and organizations involved…
Information technology — Security techniques — Privacy framework
This document provides a privacy framework which:
— specifies a common privacy terminology;
— defines the actors and their roles in processing personally identifiable information (PII);
— describes privacy safeguarding considerations;
— provides references to known privacy principles for information technology.
This document is applicable to natural persons and organizations involved…
Appareils électromédicaux - Partie 2-26 : Exigences particulières pour la sécurité de base et les pe...
IEC 80601-2-26:2019+AMD1:2024 CSV s'applique à la SECURITE DE BASE et aux PERFORMANCES ESSENTIELLES des ELECTROENCEPHALOGRAPHES définis en 201.3.204, aussi appelés APPAREILS EM ou SYSTEMES EM dans la présente norme. Le présent document est applicable aux ELECTROENCEPHALOGRAPHES destinés à être utilisés dans les établissements de soins professionnels, l'ENVIRONNEMENT DES SERVICES…
Communication networks and systems for power utility automation - Part 80-5: Guideline for mapping i...
IEC TR 61850-80-5:2024, which is a Technical Report, specifies the mapping rules for building and configuring a system using both IEC 61850 and IEC 61158-6 (Industrial communication networks - Fieldbus specification, CPF Type 15, Modbus) protocols by utilizing gateways between IEC 61850 and IEC 61158-6 IEDs / subsystems. The objective is to enable operational run-time data exchange among these…
1 Scope
1.1
This Standard specifies material and fabrication requirements for corrugated steel pipe, spiral rib pipe, structural plate, and two-flange tunnel liner plate.
1.2
This Standard applies to corrugated steel pipe and buried structures for applications such as culverts, storm sewers, storm water management systems, subdrains, hydraulic structures, grade separations, and tunnels.
1.3…
Information technology — Security techniques — Storage security
This document provides detailed technical requirements and guidance on how organizations can achieve an appropriate level of risk mitigation by employing a well-proven and consistent approach to the planning, design, documentation, and implementation of data storage security. Storage security applies to the protection of data both while stored in information and communications technology (ICT)…
Information technology - Security techniques - Storage security
This document provides detailed technical requirements and guidance on how organizations can achieve an appropriate level of risk mitigation by employing a well-proven and consistent approach to the planning, design, documentation, and implementation of data storage security. Storage security applies to the protection of data both while stored in information and communications technology (ICT)…