Information security, cybersecurity and privacy protection — Application of ISO 31000:2018 for organ...
Scope
This document provides guidelines for organizational privacy risk management, extended from ISO 31000:2018.
This document provides guidance to organizations for integrating risks related to the processing of personally identifiable information (PII) as part of an organizational privacy risk management programme. It distinguishes between the impact that processing PII can have on an…
Information security, cybersecurity and privacy protection — Privacy enhancing data de-identificatio...
Scope
This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.
This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller’s behalf…
Information security, cybersecurity and privacy protection — Verification of cryptographic protocols...
Scope
This document establishes a framework for the verification of cryptographic protocol specifications according to academic and industry best practices.
Information technology — Security techniques — Guidelines for privacy impact assessment
Scope
This document gives guidelines for:
— a process on privacy impact assessments, and
— a structure and content of a PIA report.
It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations.
This document is relevant to those involved in designing or implementing projects, including the…
Information technology — Biometric presentation attack detection — Part 3: Testing and reporting
Scope
This document establishes:
— principles and methods for the performance assessment of presentation attack detection (PAD) mechanisms;
— reporting of testing results from evaluations of PAD mechanisms; and
— a classification of known attack types (Annex A).
Outside the scope are:
— standardization of specific PAD mechanisms;
— detailed information about countermeasures (i.e. anti-…
Information technology — Smart City ICT reference framework — Part 1: Smart city business process fr...
Scope
This document specifies a generic business process framework for a smart city focusing solely on smart city-specific processes. Generic business processes common between smart cities and commercial organizations are be identified but not detailed.
Internet of things (IoT) — Data exchange platform for IoT services — Part 2: Transport interoperabil...
Scope
This part of ISO/IEC 30161 specifies the following items for the transport interoperability
between nodal points in the IoT data exchange platform (IoT DEP):
– requirements;
– functional blocks;
– operation mechanism.
Internet of Things (IoT) — Overview and general requirements of IoT system for ecological environmen...
Scope
This document specifies the Internet of Things system for ecological environment monitoring
in terms of the following:
– system infrastructure and system entities of the IoT system for ecological environment
monitoring for natural entities such as air, water, soil, living organisms; and
– the general requirements of the IoT system for ecological environment monitoring.
Enamelled cast iron and enamelled steel plumbing fixtures
1 Scope
1.1 Overview
This Standard covers enamelled cast iron and enamelled steel plumbing fixtures, and specifies requirements for materials, construction, performance, testing, and markings.
1.2 Inclusions
This Standard covers the following plumbing fixtures:
a)
bathtubs;
b)
drinking fountains and water coolers;
c)
lavatories;
d)
shower bases; and
e)
sinks:
i)
bar sinks;
ii)…