Information and communication technology (ICT) code for buildings
1 Scope
1.1 General
This Code specifies the requirements for those parts of a building’s information and communication technology (ICT) infrastructure that enhance the safety, security, and reliability of the building by detecting or causing changes through the direct monitoring and/or control of a building’s real property equipment, assets, processes, and events. It applies to buildings,…
Code des technologies de l’information et de la communication (TIC) pour les bâtiments
1 Domaine d’application
1.1 Généralités
Le présent code spécifie les exigences pour ces parties de l’infrastructure de technologies de l’information et de la communication (TIC) d’un bâtiment qui améliorent la sûreté, la sécurité et la fiabilité du bâtiment en détectant ou en provoquant des changements par la surveillance et/ou la commande directes de l’équipement, des actifs, des procédés et…
Programming languages — Fortran — Part 1: Base language
1 Scope
This document specifies the form and establishes the interpretation of programs expressed in the base Fortran
language. The purpose of this document is to promote portability, reliability, maintainability, and efficient
execution of Fortran programs for use on a variety of computing systems.
This document specifies
• the forms that a program written in the Fortran language can take…
Artificial intelligence — Data quality for analytics and machine learning (ML) — Part 4: Data qualit...
1 Scope
This document establishes general common organizational approaches, regardless of the type, size or nature of the applying organization, to ensure data quality for training and evaluation in analytics and machine learning (ML). It includes guidance on the data quality process for:
— supervised ML with regard to the labelling of data used for training ML systems, including common…
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit...
1 Scope
This document specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1.
The requirements contained in this document are demonstrated in terms of competence and reliability by bodies providing ISMS certification. The guidance contained in…
Information technology — Security techniques — Privacy framework
1 Scope
This document provides a privacy framework which:
— specifies a common privacy terminology;
— defines the actors and their roles in processing personally identifiable information (PII);
— describes privacy safeguarding considerations;
— provides references to known privacy principles for information technology.
This document is applicable to natural persons and organizations…
1 Scope
This document establishes terminology for digital twin (DTw) and describes concepts in the field
of digital twin, including the terms and definitions of digital twin, concepts of digital twin
(e.g. digital twin system context, life cycle process for digital twin, types of digital twin),
functional view of digital twin, and digital twin stakeholders.
This document can be used in the…
Information technology — Artificial intelligence — Management system
1 Scope
This document specifies the requirements and provides guidance for establishing, implementing, maintaining and continually improving an AI (artificial intelligence) management system within the context of an organization.
This document is intended for use by an organization providing or using products or services that utilize AI systems. This document is intended to help the…
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hard...
1 Scope
This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target entity, objective pattern, and method of deployment. Moreover, this document summarizes the possible ways of utilizing monitoring technologies for hardware security…
Telecommunications and information exchange between systems — Specific requirements for local and me...
1.1 Scope
The scope of this standard is to define one medium access control (MAC) and several physical layer (PHY)
specifications for wireless connectivity for fixed, portable, and moving stations (STAs) within a local area.