Information technology — Governance of IT — Governance implications of the use of artificial intelli...
1 Scope
This document provides guidance for members of the governing body of an organization to enable and govern the use of Artificial Intelligence (AI), in order to ensure its effective, efficient and acceptable use within the organization.
This document also provides guidance to a wider community, including:
— executive managers;
— external businesses or technical specialists, such as…
Information security, cybersecurity and privacy protection – Privacy enhancing data de-identificatio...
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller’s behalf,…
Information security, cybersecurity and privacy protection – Privacy enhancing data de-identificatio...
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller’s behalf,…
This document provides guiding principles and recommendations to enable a common, global approach to achieving net zero greenhouse gas emissions through alignment of voluntary initiatives and adoption of standards, policies and national and international regulation.
This document provides guidance on what governance organizations and other organizations can do to effectively contribute to global…
Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organ...
This document provides guidelines for organizational privacy risk management, extended from ISO 31000:2018.
This document provides guidance to organizations for integrating risks related to the processing of personally identifiable information (PII) as part of an organizational privacy risk management programme. It distinguishes between the impact that processing PII can have on an individual…
Information security, cybersecurity and privacy protection - Application of ISO 31000:2018 for organ...
This document provides guidelines for organizational privacy risk management, extended from ISO 31000:2018.
This document provides guidance to organizations for integrating risks related to the processing of personally identifiable information (PII) as part of an organizational privacy risk management programme. It distinguishes between the impact that processing PII can have on an individual…
Connected Cities – Part 1: Discovery of Digital Twins for Built Environments
Scope
The CAN/CIOSC 106 series of Standards specifies minimum requirements for the discovery and
management activities for context-rich, digital representations of built environments (i.e., digital twin).
The following are within the scope of CAN/CIOSC 106-1:
- Acquiring, collection, and organization of information and data on different subsystems and
protocols used to discover and define…
Blockchain and distributed ledger technologies – Use cases
This document lists use cases that summarise common capabilities and usage patterns for attributes of distributed ledger technologies including the blockchain in order to help standards and technology development. This document includes use cases reflecting a range of industry sectors, processes and specific applications.
This document can inform decision-makers considering or involved in…
Safety, security and sustainability of cannabis facilities and operations — Part 2: Requirements for...
This document specifies minimum requirements for the security of sites and facilities that handle cannabis and cannabis products for the purposes of cultivation (indoor and outdoor), processing, storage/distribution, transportation, retail sales, and research and testing, in order to prevent harm and/or unauthorized access to assets including (but not limited to):
— physical assets;
— …
Software and systems engineering — Software testing — Part 2: Test processes
1 Scope
This document specifies test processes that can be used to govern, manage and implement software
testing for any organization, project or testing activity. It comprises generic test process descriptions
that define the software testing processes. Supporting informative diagrams describing the processes
are also provided.
This document is applicable to testing in all software…