1 Domaine d’application
1.1 Objet
Cette norme énonce les exigences techniques pour rendre les bâtiments et l’environnement extérieur bâti accessibles aux ce domaine pour déterminer dans quelle mesure cette édition de la norme s’applique.
Le Comité technique qui a élaboré cette norme reconnaît qu’elle agit dans un contexte d’initiatives sociales et réglementaires plus vaste. Par exemple, la…
1 Scope
1.1 Application
This Standard can be used in the design and construction of new homes, or in alterations to existing housing, as it pertains to accessibility. This includes the design, construction, and alteration of built environments leading up to, into, and throughout accessible dwellings.
The requirements in this Standard are suitable for permanent dwellings, short-term dwellings…
1 Domaine d’application
1.1 Application
Cette norme est utilisable pour la conception et la construction de nouveaux domiciles ou pour la transformation de logements existants en ce qui concerne leur accessibilité. Cela s’applique à la conception, à la construction et à la transformation de l’environnement bâti permettant l’accessibilité, pour entrer et se déplacer dans les logements…
Medical electrical equipment — Part 2-39: Particular requirements for basic safety and essential per...
Scope
Replacement:
This part of IEC 60601 applies to the BASIC SAFETY and ESSENTIAL PERFORMANCE of
PERITONEAL DIALYSIS ME EQUIPMENT as defined in 201.3.208, hereafter referred to as
PD EQUIPMENT. It applies to PD EQUIPMENT intended for use either by medical staff or under the
supervision of medical experts, including PD EQUIPMENT operated by the PATIENT, regardless of
whether the PD…
Information technology — Vocabulary — Part 37: Biometrics
1 Scope
This document establishes a systematic description of the concepts in the field of biometrics pertaining
to recognition of human beings. This document also reconciles variant terms in use in pre-existing
International Standards on biometrics against the preferred terms, thereby clarifying the use of terms
in this field.
This document does not cover concepts (represented by terms)…
Information technology — Codes for the representation of human sexes
1 Scope
This document specifies a uniform representation of human sexes for the interchange of information. It is intended to:
— reduce the time required to record and/or format the representation of sexes and transmit the corresponding data;
— improve clarity and accuracy of interchange;
— minimize the amount of human intervention required for communicating the representation of sexes; and…
Identification cards — Integrated circuit cards — Part 11: Personal verification through biometric m...
1 Scope
This document specifies security-related interindustry commands that are intended to be used for personal verification through biometric methods in integrated circuit cards. It also defines the data structure and data access methods for use of the card as a carrier of the biometric reference and/or as the device to perform the verification of the cardholder's biometric probe (on-…
Information security — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve ge...
1 Scope
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 29192-4, ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3, ISO/IEC 18033-2 and ISO/IEC 18033-5.This document is applicable to…
Framework for Artificial Intelligence (AI) Systems Using Machine Learning (ML)
1 Scope
This document establishes an Artificial Intelligence (AI) and Machine Learning (ML) framework for describing a generic AI system using ML technology. The framework describes the system components and their functions in the AI ecosystem. This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit…
Information security, cybersecurity and privacy protection — Information security controls
1 Scope
This document provides a reference set of generic information security controls including
implementation guidance. This document is designed to be used by organizations:
a) within the context of an information security management system (ISMS) based on ISO/IEC 27001;
b) for implementing information security controls based on internationally recognized best practices;
c) for…