BS ISO/IEC 29101:2013
|
Information technology. Security techniques. Privacy architecture framework |
BS PD ISO/TR 20748-2 : 2017
|
INFORMATION TECHNOLOGY FOR LEARNING, EDUCATION AND TRAINING - LEARNING ANALYTICS INTEROPERABILITY - PART 2: SYSTEM REQUIREMENTS |
PD ISO/TR 17465-1:2014
|
Intelligent transport systems. Cooperative ITS Terms and definitions |
BS ISO/IEC 29134:2017
|
Information technology. Security techniques. Guidelines for privacy impact assessment |
ISO/TR 17465-1:2014
|
Intelligent transport systems Cooperative ITS Part 1: Terms and definitions |
BS ISO/IEC 19944:2017
|
Information technology. Cloud computing. Cloud services and devices: Data flow, data categories and data use |
18/30346433 DC : 0
|
BS ISO/IEC 19086-4 - INFORMATION TECHNOLOGY - CLOUD COMPUTING SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 4: SECURITY AND PRIVACY |
12/30232747 DC : DRAFT JAN 2013
|
BS ISO/IEC 29182-4 - INFORMATION TECHNOLOGY-SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
CSA ISO/IEC 27050-1 : 2018
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1: OVERVIEW AND CONCEPTS |
14/30268906 DC : 0
|
BS ISO/IEC 17789 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE |
TS 103 532 : 1.1.1
|
CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL |
17/30318701 DC : 0
|
BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES |
INCITS/ISO/IEC 24745 : 2012(R2017)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
INCITS/ISO/IEC 29182-4 : 2014
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 4: ENTITY MODELS |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
ISO/IEC 27018:2014
|
Information technology Security techniques Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
S.R. CEN/TR 16742:2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
DIN ISO/IEC 17789:2017-07
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
JIS X 9252:2023
|
Information technology -- Online privacy notices and consent |
CSA ISO/IEC 27018 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS |
INCITS/ISO/IEC 29115 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
ISO/IEC TR 30117:2014
|
Information technology Guide to on-card biometric comparison standards and applications |
BS EN 16571:2014
|
Information technology. RFID privacy impact assessment process |
BS ISO/IEC 29115:2013
|
Information technology. Security techniques. Entity authentication assurance framework |
PD CEN/TR 16742:2014
|
Intelligent transport systems. Privacy aspects in ITS standards and systems in Europe |
CSA ISO/IEC 27002 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
BS ISO/IEC 17789:2014
|
Information technology. Cloud computing. Reference architecture |
PD ISO/TS 12812-2:2017
|
Core banking. Mobile financial services Security and data protection for mobile financial services |
17/30349181 DC : 0
|
BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
PD CEN/TS 16702-1:2014
|
Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
PD ISO/IEC TR 29144:2014
|
Information technology. Biometrics. The use of biometric technology in commercial Identity Management applications and processes |
10/30143797 DC : 0
|
BS ISO/IEC 24760-1 - INFROMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS |
12/30232744 DC : 0
|
BS ISO/IEC 29182-3 - REFERENCE ARCHITECTURE FOR SENSOR NETWORK APPLICATIONS AND SERVICES - PART 3: REFERENCE ARCHITECTURE VIEWS |
BS ISO/IEC 29151:2017
|
Information technology. Security techniques. Code of practice for personally identifiable information protection |
BS ISO/IEC 24760-1:2011
|
Information technology. Security techniques. A framework for identity management Terminology and concepts |
18/30331887 DC : 0
|
BS ISO/IEC 20889 - INFORMATION TECHNOLOGY- SECURITY TECHNIQUES - PRIVACY ENHANCING DATA DE-IDENTIFICATION TECHNIQUES |
BS ISO/IEC 38505-1:2017
|
Information technology. Governance of IT. Governance of data Application of ISO/IEC 38500 to the governance of data |
ISO/IEC 19944:2017
|
Information technology Cloud computing Cloud services and devices: Data flow, data categories and data use |
UNE-ISO/IEC 27002:2015
|
Information technology -- Security techniques -- Code of practice for information security controls |
TR 103 304 : 1.1.1
|
CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES |
ISO/IEC 29101:2013
|
Information technology Security techniques Privacy architecture framework |
ISO/IEC 19286:2018
|
Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services |
BS ISO/IEC 27002 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
UNE-EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
ISO/TS 12812-2:2017
|
Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services |
CEN/TS 16702-1:2014
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
DIN EN 16571:2014-10
|
INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
16/30278511 DC : 0
|
BS ISO/IEC 29134 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY IMPACT ASSESSMENT - GUIDELINES |
DIN EN ISO/IEC 27002 E : 2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
ISO/IEC TR 20748-2:2017
|
Information technology for learning, education and training Learning analytics interoperability Part 2: System requirements |
BS EN ISO/IEC 27002:2017
|
Information technology. Security techniques. Code of practice for information security controls |
BS ISO/IEC 24745:2011
|
Information technology. Security techniques. Biometric information protection |
12/30168690 DC : 0
|
BS ISO/IEC 29101 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY ARCHITECTURE FRAMEWORK |
15/30281583 DC : 0
|
BS ISO 12812-2 - CORE BANKING - MOBILE FINANCIAL SERVICES - PART 2: SECURITY AND DATA PROTECTION FOR MOBILE FINANCIAL SERVICES |
ISO/IEC 29182-4:2013
|
Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 4: Entity models |
BS ISO/IEC 19286:2018
|
Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services |
DIN EN ISO/IEC 27002:2017-06
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
I.S. EN ISO 25237:2017
|
HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
S.R. CEN/TS 16702-1:2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
UNI EN 16571 : 2014
|
INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
16/30287629 DC : 0
|
BS ISO/IEC 27050-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 1 OVERVIEW AND CONCEPTS |
BS ISO/IEC 27018:2014
|
Information technology. Security techniques. Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
ISO/IEC 29182-3:2014
|
Information technology Sensor networks: Sensor Network Reference Architecture (SNRA) Part 3: Reference architecture views |
14/30304350 DC : 0
|
BS EN ISO 27799 - HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
10/30136309 DC : 0
|
BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
UNI CEN/TS 16702-1 : 2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
12/30168696 DC : 0
|
BS ISO/IEC 29115 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
DIN ISO/IEC 17789:2016-10 (Draft)
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
16/30316173 DC : 0
|
BS ISO/IEC 19086-1 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - SERVICE LEVEL AGREEMENT (SLA) FRAMEWORK - PART 1: OVERVIEW AND CONCEPTS |
DIN EN ISO 25237:2015-10 (Draft)
|
HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
BS ISO/IEC 29182-4:2013
|
Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) Entity models |
13/30266767 DC : 0
|
BS ISO/IEC 27018 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR P2 PROTECTION IN PUBLIC CLOUD ACTING AS P2 PROCESSORS |
BS EN ISO 27799:2008
|
Health informatics. Information security management in health using ISO/IEC 27002 |
ISO/IEC 24760-3:2016
|
Information technology — Security techniques — A framework for identity management — Part 3: Practice |
ISO/IEC 29134:2017
|
Information technology — Security techniques — Guidelines for privacy impact assessment |
INCITS/ISO/IEC TR 29144 : 2015
|
INFORMATION TECHNOLOGY - BIOMETRICS - THE USE OF BIOMETRIC TECHNOLOGY IN COMMERCIAL IDENTITY MANAGEMENT APPLICATIONS AND PROCESSES |
CAN/CSA-ISO/IEC 19086-1:18
|
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts (Adopted ISO/IEC 19086-1:2016, first edition, 2016-09-15) |
SR 003 391 : 2.1.1
|
CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
CAN/CSA-ISO/IEC 18305:18
|
Information technology — Real time locating systems — Test and evaluation of localization and tracking systems (Adopted ISO/IEC 1830 5:2016, first edition, 2016-11-01) |
I.S. EN ISO/IEC 27002:2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS (ISO/IEC 27002:2013 INCLUDING COR 1:2014 AND COR 2:2015) |
I.S. ISO/IEC 27002:2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CEI UNI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC TR 29144:2014
|
Information technology Biometrics The use of biometric technology in commercial Identity Management applications and processes |
ISO/IEC 29115:2013
|
Information technology Security techniques Entity authentication assurance framework |
ISO 25237:2017
|
Health informatics — Pseudonymization |
EN ISO/IEC 27002:2017
|
Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 including Cor 1:2014 and Cor 2:2015) |
EN ISO 27799:2016
|
Health informatics - Information security management in health using ISO/IEC 27002 (ISO 27799:2016) |
EN ISO 25237:2017
|
Health informatics - Pseudonymization (ISO 25237:2017) |
EN 16571:2014
|
Information technology - RFID privacy impact assessment process |
BS ISO/IEC 29190:2015
|
Information technology. Security techniques. Privacy capability assessment model |
ISO/IEC 24760-1:2011
|
Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
16/30313038 DC : 0
|
BS ISO/IEC 19944 - INFORMATION TECHNOLOGY - CLOUD COMPUTING - CLOUD SERVICES AND DEVICES: DATA FLOW, DATA CATEGORIES AND DATA USE |
ISO/IEC TR 38505-2:2018
|
Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management |
ISO/IEC 18305:2016
|
Information technology — Real time locating systems — Test and evaluation of localization and tracking systems |
CAN/CSA-ISO/IEC 17789:16
|
Information technology Cloud computing Reference architecture (Adopted ISO/IEC 17789:2014, first edition, 2014-10-15) |
BS EN ISO 25237:2017
|
Health informatics. Pseudonymization |
DIN ISO/IEC 17789 E : 2017
|
INFORMATION TECHNOLOGY - CLOUD COMPUTING - REFERENCE ARCHITECTURE (ISO/IEC 17789:2014) |
DIN ISO/IEC 27018:2017-08
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR PROTECTION OF PERSONALLY IDENTIFIABLE INFORMATION (PII) IN PUBLIC CLOUDS ACTING AS PII PROCESSORS (ISO/IEC 27018:2014) |
ISO/IEC 38505-1:2017
|
Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data |
16/30333228 DC : 0
|
BS ISO/IEC 38505-1 - INFORMATION TECHNOLOGY - GOVERNANCE OF IT - PART 1: THE APPLICATION OF ISO/IEC 38500 TO THE GOVERNANCE OF DATA |
INCITS/ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
DIN EN 16571 E : 2014
|
INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
BS ISO/IEC 29182-3:2014
|
Information technology. Sensor networks: Sensor Network Reference Architecture (SNRA) Reference architecture views |
14/30216195 DC : 0
|
BS ISO/IEC 29190 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PRIVACY CAPABILITY ASSESSMENT MODEL |
ISO/IEC 29190:2015
|
Information technology Security techniques Privacy capability assessment model |
18/30325702 DC : 0
|
BS ISO/IEC 27050-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ELECTRONIC DISCOVERY - PART 2: GUIDANCE FOR GOVERNANCE AND MANAGEMENT OF ELECTRONIC DISCOVERY |
INCITS/ISO/IEC 29182-3 : 2014
|
INFORMATION TECHNOLOGY - SENSOR NETWORKS: SENSOR NETWORK REFERENCE ARCHITECTURE (SNRA) - PART 3: REFERENCE ARCHITECTURE VIEWS |
I.S. EN 16571:2014
|
INFORMATION TECHNOLOGY - RFID PRIVACY IMPACT ASSESSMENT PROCESS |
ISO/IEC 29151:2017
|
Information technology — Security techniques — Code of practice for personally identifiable information protection |
CAN/CSA-ISO/IEC 24760-3:18
|
Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01) |
UNI CEI ISO/IEC 27002 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
ISO/IEC 19086-1:2016
|
Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts |
ISO/IEC 17789:2014
|
Information technology — Cloud computing — Reference architecture |
ISO/IEC 24745:2011
|
Information technology Security techniques Biometric information protection |
ISO/IEC 27050-1:2016
|
Information technology Security techniques Electronic discovery Part 1: Overview and concepts |
15/30302181 DC : 0
|
BS ISO/IEC 18305 - INFORMATION TECHNOLOGY - REAL TIME LOCATING SYSTEMS - TEST AND EVALUATION OF LOCALIZATION AND TRACKING SYSTEMS |
CEN/TR 16742 : 2014
|
INTELLIGENT TRANSPORT SYSTEMS - PRIVACY ASPECTS IN ITS STANDARDS AND SYSTEMS IN EUROPE |
NS-ISO/IEC 42001:2023
|
Information technology - Artificial intelligence - Management system |
ITU-T X.1410 (03/2023)
|
Security architecture of data sharing management based on the distributed ledger technology |