Information technology - JPSearch - Part 2: Registration, identification and management of schema an...
This document specifies a series of interfaces to allow disparate systems an interoperable management of image repositories. It also specifies the general rules which govern the usage of metadata in JPSearch and provides a specification which
provides rules for the representation of image metadata descriptions, consisting of the definition of the JPSearch Core Metadata Schema,
provides rules for…
The measures in this standard were calculated from detecting and counting violations of good architectural and coding practices in the source code that could result in unacceptable operational risks or excessive costs. Establishing standards for these measures at the source code level is important because they have been used in outsourcing and system development contracts without having…
The measures in this standard were calculated from detecting and counting violations of good architectural and coding practices in the source code that could result in unacceptable operational risks or excessive costs. Establishing standards for these measures at the source code level is important because they have been used in outsourcing and system development contracts without having…
Information technology — Business operational view — Part 12: Privacy protection requirements (PPR) ...
1 Scope
This document:
— provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in business operational view (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and…
Information technology — Governance of IT — Application of ISO/IEC 38500 to the governance of IT ena...
1 Scope
This document provides guidance on governance of IT enabled investments to the governing body of all forms of organizations, whether private, public or government entities, and will equally apply regardless of the size of the organization or its industry or sector. The terms business and business outcome throughout this document include all forms of organization covered by this document…
Standard for Devices for Detection, Monitoring or Control of Plumbing Systems
1.1 General
1.1.1 This standard covers devices for detection, monitoring or control of water supply and
distribution systems in sizes DN 8 to DN 300 (NPS-1/4 to NPS-12) for commercial and residential
applications and specifies requirements for materials, performance testing, environmental
limitations, installation, and markings.
1.1.2 Devices for detection, monitoring or control of plumbing…
Electronic business eXtensible Markup Language (ebXML) — Part 1: Messaging service core specificatio...
This document provides a communication-protocol neutral method for exchanging electronic business messages. It defines specific enveloping constructs supporting reliable, secure delivery of business information. Furthermore, this document defines a flexible enveloping technique, permitting messages to contain payloads of any format type.
It specifies each of the following:
? Messaging…
Performance requirements for climate resilience of low slope membrane roofing systems
1 Scope
1.1
This Standard outlines requirements for low slope membrane roofing systems (LSMRS) when identified as “silver” and “gold” performance level based on the climate severity and resilience requirements.
Note: The National Building Code of Canada and the National Energy Code of Canada for Buildings provides “bronze” requirements for LSMRS.
1.2
This Standard is intended to be used by…
Information technology — Cybersecurity — Overview and concepts
This document provides an overview of cybersecurity.
This document:
— describes cybersecurity and relevant concepts, including how it is related to and different from information security;
— establishes the context of cybersecurity;
— does not cover all terms and definitions applicable to cybersecurity; and
— does not limit other standards in defining new cybersecurity-related…
Information technology - Cybersecurity - Overview and concepts
This document provides an overview of cybersecurity.
This document:
— describes cybersecurity and relevant concepts, including how it is related to and different from information security;
— establishes the context of cybersecurity;
— does not cover all terms and definitions applicable to cybersecurity; and
— does not limit other standards in defining new cybersecurity-related…