Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 31 - 40 de 556
Equity, diversity, inclusion, and accessibility in apprenticeship programs
1 Scope 1.1 Inclusions This Standard specifies requirements and provides guidelines for equity, diversity, inclusion, and accessibility (EDIA) in apprenticeship programs. This Standard is applicable to all aspects of an apprenticeship system including pre-apprenticeship, classroom learning, mentorship, and on-the-job training delivered in an apprenticeable trade, and for which successful…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2024-03-31
Code(s) de l'ICS :
03.100.30
Information technology - Use of biometrics in video surveillance systems - Part 1: System design and...
The ISO/IEC 30137 series is applicable to the use of biometrics in VSSs (also known as closed circuit television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post-event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities, such as gait…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2024-03-07
Code(s) de l'ICS :
35.240.15
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and...
The ISO/IEC 30137 series is applicable to the use of biometrics in VSSs (also known as closed circuit television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post-event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities, such as gait…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2024-03-07
Code(s) de l'ICS :
35.240.15
Information security, cybersecurity and privacy protection - Ontology building blocks for security a...
This document defines an inventory of building blocks conceptually associated with different types of assessments of information and communication technology (ICT) trustworthiness. These assessments apply to areas such as governance, risk management, security evaluation, secure development lifecycle (SDL), supply chain integrity and privacy. This document also defines an ontology that organizes…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2024-03-04
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Ontology building blocks for security a...
This document defines an inventory of building blocks conceptually associated with different types of assessments of information and communication technology (ICT) trustworthiness. These assessments apply to areas such as governance, risk management, security evaluation, secure development lifecycle (SDL), supply chain integrity and privacy. This document also defines an ontology that organizes…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2024-03-04
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organ...
Scope This document provides guidelines for organizational privacy risk management, extended from ISO 31000:2018. This document provides guidance to organizations for integrating risks related to the processing of personally identifiable information (PII) as part of an organizational privacy risk management programme. It distinguishes between the impact that processing PII can have on an…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2024-02-29
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Privacy enhancing data de-identificatio...
Scope This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data. This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller’s behalf…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2024-02-29
Code(s) de l'ICS :
35.030
Information technology — Security techniques — Guidelines for privacy impact assessment
Scope This document gives guidelines for: — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations. This document is relevant to those involved in designing or implementing projects, including the…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2024-02-29
Code(s) de l'ICS :
35.030
Information technology — Governance of IT — Governance implications of the use of a shared digital s...
This document provides guidance for members of governing bodies of organizations on the effective, efficient and acceptable use of a shared digital service platform among ecosystem organizations by: —     establishing a vocabulary for the governance of a shared digital service platform among ecosystem organizations; —     providing a framework for understanding the implications of the use of a…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2024-02-22
Code(s) de l'ICS :
35.020
Information technology — Governance of IT for the organization
This document provides guiding principles for members of governing bodies of organizations and those that support them on the effective, efficient and acceptable use of information technology (IT) within their organizations. This document is applicable to: —     the governance of the organization’s current, and future, use of IT; —     the governance of IT as a domain of governance of…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2024-02-22
Code(s) de l'ICS :
35.020

Spacer